Sciweavers

294 search results - page 54 / 59
» Introducing Executable Product Models for the Service Indust...
Sort
View
SAINT
2003
IEEE
14 years 18 days ago
JGN IPv6 Network
To cope with the various problems arising from Internet protocol such as scarcity of IP addresses in the Internet and increase in the number of paths, research and development has...
Kazumasa Kobayashi, Kazuhiko Nakamura, Hisayoshi H...
HICSS
2002
IEEE
128views Biometrics» more  HICSS 2002»
14 years 8 days ago
Flexible Instructional Strategies for E-learning
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. ...
Michael Altenhofen, Joachim Schaper

Publication
145views
13 years 3 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
ASPLOS
2004
ACM
14 years 23 days ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
TES
2001
Springer
13 years 11 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...