Sciweavers

5324 search results - page 768 / 1065
» Internet Security Protocols
Sort
View
WMASH
2003
ACM
14 years 4 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
ISI
2003
Springer
14 years 4 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
SAC
2000
ACM
14 years 3 months ago
XML Dataspaces for Mobile Agent Coordination
This paper presents XMARS, a programmable coordination architecture for Internet applications based on mobile agents. In XMARS, agents coordinate – both with each other and with...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
CEAS
2008
Springer
14 years 28 days ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
JNW
2007
113views more  JNW 2007»
13 years 10 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...