Sciweavers

2904 search results - page 6 / 581
» Internet Infrastructure Security
Sort
View
WMI
2001
147views more  WMI 2001»
13 years 11 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
WIKIS
2009
ACM
14 years 4 months ago
Suffr: democratic control of computing infrastructure
Suffr uses Wiki to facilitate corporate governance. Suffr allows a group's members to administer a computer system and its information resources collectively. Categories and ...
Kirk Zurell
AISM
2004
13 years 11 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
ISCC
2005
IEEE
14 years 3 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
JNSM
2010
110views more  JNSM 2010»
13 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...