Sciweavers

1863 search results - page 282 / 373
» Security Architecture for Web Services
Sort
View
CGO
2006
IEEE
14 years 4 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
COMCOM
2008
104views more  COMCOM 2008»
13 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
WISA
2009
Springer
14 years 4 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 8 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....
WWW
2001
ACM
14 years 10 months ago
Scaling question answering to the Web
The wealth of information on the web makes it an attractive resource for seeking quick answers to simple, factual questions such as "who was the first American in space?"...
Cody C. T. Kwok, Oren Etzioni, Daniel S. Weld