Sciweavers

595 search results - page 63 / 119
» Malware Defense Using Network Security Authentication
Sort
View
97
Voted
CN
2006
79views more  CN 2006»
15 years 2 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 6 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
121
Voted
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 9 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
133
Voted
CCS
2011
ACM
14 years 2 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
95
Voted
ICCSA
2005
Springer
15 years 8 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo