Sciweavers

630 search results - page 23 / 126
» Acceptable internet use policy
Sort
View
ACISP
2008
Springer
14 years 1 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
CCS
2007
ACM
14 years 1 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
INFOCOM
2000
IEEE
13 years 12 months ago
Management of Advanced Services in H.323 Internet Protocol Telephony
The Intelligent Network (IN) represents the world wide accepted basis for uniform provisioning of advanced telecom services. On the other hand IP based communication is fast becomi...
Bernard Pagurek, Jinrong Tang, Tony White, Roch H....
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
OTM
2010
Springer
13 years 6 months ago
Fadip: Lightweight Publish/Subscribe for Mobile Ad Hoc Networks
Publish/Subscribe is an interesting communication paradigm because it fosters a high degree of decoupling between the communicating parties and provides the ability to communicate ...
Koosha Paridel, Yves Vanrompay, Yolande Berbers