Sciweavers

6844 search results - page 1048 / 1369
» Web Service Security
Sort
View
169
Voted
ICOIN
2004
Springer
15 years 10 months ago
Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks
This paper presents auto-networking technologies for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address autoconfiguration, IPv6 multicas...
Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim
RE
2004
Springer
15 years 10 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt
IWAN
1999
Springer
15 years 9 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...
129
Voted
ISN
1998
Springer
15 years 9 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
118
Voted
ICICS
1997
Springer
15 years 9 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
« Prev « First page 1048 / 1369 Last » Next »