Sciweavers

1422 search results - page 258 / 285
» Information security and risk management
Sort
View
HSNMC
2004
Springer
165views Multimedia» more  HSNMC 2004»
14 years 2 months ago
An Architecture for User Location in Heterogeneous Mobile Networks
Fourth generation mobile networks will allow end-users to roam over different network technologies, such as UMTS, CDMA2000 and Wi-Fi. These mobile networks make it possible to dete...
Maarten Wegdam, Jeroen van Bemmel, Ko Lagerberg, P...
DISCEX
2003
IEEE
14 years 2 months ago
ANON: An IP-Layer Anonymizing Infrastructure
This exhibition demonstrates an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anon...
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Br...
DISCEX
2003
IEEE
14 years 2 months ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...
DISCEX
2003
IEEE
14 years 2 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...