Sciweavers

2562 search results - page 448 / 513
» An Internet without the Internet protocol
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 10 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NETWORKING
2000
13 years 10 months ago
Threshold-Based Registration (TBR) in Mobile IPv6
The underlying principles of IETF Internet Draft, Mobility Support in IPv6, make it possible to employ some mechanisms to improve handoff smoothness, to maintain optimized data tra...
Linfeng Yang, Jouni Karvo, Teemu Tynjälä...
WEBNET
1997
13 years 10 months ago
Cineast - An Extensible Web Browser
: Cineast is a freely available, extensible Web browser which intends to provide an environment for prototyping new client side Internet technologies. Cineast has built-in support ...
Eckhart Köppen, Gustaf Neumann, Stefan Nusser
CATA
2009
13 years 10 months ago
Performance Enhancement of Web Server System
The invention of the Internet has ushered in advances in information era which has revolutionized the way we conduct business, advances our knowledge and promote life long learning...
Sarah Tasneem, Reda A. Ammar, Lester Lipsky, Howar...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 9 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang