Sciweavers

347 search results - page 31 / 70
» On private computation in incomplete networks
Sort
View
ISN
1995
Springer
13 years 11 months ago
VPN on DCE: From Reference Configuration to Implementation
–This paper presents the results of the implementation of a Virtual Private Network telecommunications service prototype and associated management services on a distributed platf...
Jean-Paul Gaspoz, Constant Gbaguidi, Jens Meink&ou...
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
PAM
2012
Springer
12 years 3 months ago
Geolocating IP Addresses in Cellular Data Networks
Smartphones connected to cellular networks are increasingly being used to access Internet-based services. Using data collected from smartphones running a popular location-based app...
Sipat Triukose, Sebastien Ardon, Anirban Mahanti, ...
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
DSOM
2004
Springer
14 years 1 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...