Sciweavers

2207 search results - page 143 / 442
» Security at the Internet Layer
Sort
View
SRDS
2007
IEEE
15 years 11 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
146
Voted
WSC
2001
15 years 6 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
CN
2007
141views more  CN 2007»
15 years 4 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
JCM
2007
191views more  JCM 2007»
15 years 4 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
WWW
2008
ACM
16 years 5 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth