Sciweavers

2207 search results - page 415 / 442
» Security at the Internet Layer
Sort
View
COMCOM
2006
154views more  COMCOM 2006»
14 years 9 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
IJNSEC
2006
82views more  IJNSEC 2006»
14 years 9 months ago
A Study of Micro-payment Based on One-way Hash Chain
Electronic payment systems have gradually become an important issue nowadays because of the popularity and importance of electronic commerce on the Internet. Security and convenie...
Min-Shiang Hwang, Pei-Chen Sung
JDCTA
2008
160views more  JDCTA 2008»
14 years 9 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
JSAC
2006
137views more  JSAC 2006»
14 years 9 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
NETWORK
2006
290views more  NETWORK 2006»
14 years 9 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim