Sciweavers

2207 search results - page 365 / 442
» Security at the Internet Layer
Sort
View
SIS
2008
15 years 5 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
CIIT
2004
131views Communications» more  CIIT 2004»
15 years 5 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
CSREASAM
2004
15 years 5 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
I3E
2001
114views Business» more  I3E 2001»
15 years 5 months ago
Receipt-Freeness in Large-Scale Elections without Untappable Channels
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
I3E
2003
133views Business» more  I3E 2003»
15 years 5 months ago
Inter-Organizational E-Services Accounting Management on Computational Grids
Abstract Accounting management is of strategic importance for a successful uptake of computational Grid technology within the user community. Computational Grid is one the most imp...
Franco Arcieri, Fabio Fioravanti, Enrico Nardelli,...