Sciweavers

5324 search results - page 29 / 1065
» Internet Security Protocols
Sort
View

Lecture Notes
404views
15 years 5 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
IC
2004
13 years 9 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 2 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
BCS
2008
13 years 9 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
P2P
2008
IEEE
14 years 2 months ago
Proactive Role Discovery in Mediator-Free Environments
The rapid proliferation of Internet and related technologies has created tremendous possibilities for the interoperability between domains in distributed environments. Interoperab...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor