Sciweavers

5324 search results - page 38 / 1065
» Internet Security Protocols
Sort
View
AGENTS
1998
Springer
13 years 12 months ago
Agents for Collecting Application Usage Data Over the Internet
David M. Hilbert, David F. Redmiles
MA
2001
Springer
98views Communications» more  MA 2001»
14 years 2 days ago
A Scalable and Secure Global Tracking Service for Mobile Agents
In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile a...
Volker Roth, Jan Peters
SPW
2001
Springer
14 years 2 days ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 2 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele