Sciweavers

15379 search results - page 105 / 3076
» Protecting users from
Sort
View
INDOCRYPT
2001
Springer
14 years 7 days ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
CORR
2002
Springer
98views Education» more  CORR 2002»
13 years 7 months ago
Fast optical layer mesh protection using pre-cross-connected trails
Conventional optical networks are based on SONET rings, but since rings are known to use bandwidth inefficiently, there has been much research into shared mesh protection, which pr...
Timothy Y. Chow, Fabián A. Chudak, Anthony ...
GLOBECOM
2007
IEEE
14 years 2 months ago
GMPLS-Based Hybrid 1+N Link Protection Over p-Cycles: Design and Performance
—In [1], the author introduced a strategy to use network coding on p-Cycles in order to provide 1+N protection for straddling connections and links against single link failures i...
Ahmed E. Kamal
GI
2003
Springer
14 years 1 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
JSAC
2007
177views more  JSAC 2007»
13 years 7 months ago
Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks
— The advances in wavelength-division multiplexing (WDM) technology are expected to facilitate bandwidth-intensive multicast applications. A single fiber failure in such a netwo...
Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang