Sciweavers

2207 search results - page 10 / 442
» Security at the Internet Layer
Sort
View
108
Voted
USS
2008
15 years 5 months ago
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and "escape" into the Internet. Due to this security concern, ...
Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar
WWW
2008
ACM
16 years 4 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
151
Voted
IC
2004
15 years 4 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
77
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet
Barbara Fraser, Steve Crocker
104
Voted
ACSAC
1996
IEEE
15 years 7 months ago
On The Design Of Secure Electronic Payment Schemes For Internet
Vijay Varadharajan, Yi Mu