Sciweavers

13966 search results - page 156 / 2794
» Internet as a
Sort
View
COMCOM
2000
143views more  COMCOM 2000»
13 years 10 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
FIRSTMONDAY
2002
84views more  FIRSTMONDAY 2002»
13 years 10 months ago
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
Maura Conway
ICSE
2009
IEEE-ACM
14 years 5 months ago
Software Engineering for the Next Internet
The Internet no longer meets the world’s requirements. Recognition of the Internet architecture’s inherent flaws has opened a window of opportunity for fresh thinking: granti...
Pamela Zave
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 3 months ago
Modifying Adoption Research for Mobile Internet Service Adoption: Cross-Disciplinary Interactions
One often meets the argument that the adoption of mobile Internet services is difficult to understand due to a lack of relevant research. However, much research has already been c...
Per E. Pedersen, Rich Ling
SAINT
2002
IEEE
14 years 3 months ago
The Internet Enterprise
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...