Sciweavers

2673 search results - page 73 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
TON
2008
102views more  TON 2008»
13 years 7 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
WS
2003
ACM
14 years 1 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...
IPPS
2006
IEEE
14 years 1 months ago
Realization of virtual networks in the DECOS integrated architecture
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
Roman Obermaisser, Philipp Peti
PERCOM
2006
ACM
13 years 7 months ago
Embedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 2 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald