Sciweavers

1129 search results - page 179 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
IPOM
2005
Springer
14 years 1 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
LCN
2000
IEEE
14 years 3 days ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
WWW
2004
ACM
14 years 8 months ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
FGCS
2006
110views more  FGCS 2006»
13 years 7 months ago
Seamless live migration of virtual machines over the MAN/WAN
The "VM Turntable" demonstrator at iGRID 2005 pioneered the integration of Virtual Machines (VMs) with deterministic "lightpath" network services across MAN/WA...
Franco Travostino, Paul Daspit, Leon Gommans, Chet...