Sciweavers

1970 search results - page 22 / 394
» Security Without Firewalls
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
13 years 6 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
INFOCOM
2006
IEEE
14 years 1 months ago
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering
— Packet filtering plays a critical role in the performance of many network devices such as firewalls, IPSec gateways, DiffServ and QoS routers. A tremendous amount of research...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
CCGRID
2003
IEEE
14 years 24 days ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny

Lecture Notes
404views
15 years 5 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi