Sciweavers

2904 search results - page 493 / 581
» Internet Infrastructure Security
Sort
View
ICICIC
2006
IEEE
14 years 4 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...
IEEECIT
2006
IEEE
14 years 4 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang
INFOCOM
2006
IEEE
14 years 4 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
TRIDENTCOM
2006
IEEE
14 years 4 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
LCN
2005
IEEE
14 years 4 months ago
Automatic VPN Client Recovery from IPsec Pass-through Failures
Network Address Translation (NAT) is often used in routers that connect home and small-office networks to the Internet. Unfortunately, NAT may not interoperate well with many pro...
José Carlos Brustoloni