Sciweavers

2207 search results - page 67 / 442
» Security at the Internet Layer
Sort
View
APWEB
2008
Springer
15 years 6 months ago
Traceable P2P Record Exchange Based on Database Technologies
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
Fengrong Li, Yoshiharu Ishikawa
IMC
2009
ACM
15 years 10 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
EGOV
2011
Springer
14 years 3 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
OOPSLA
2007
Springer
15 years 10 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
120
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Enhancing TCP Over HSDPA by Cross-Layer Signalling
Abstract— A comprehensive performance evaluation of a crosslayer solution to increase users’ downlink data rates over HSDPA is provided. The solution consists of a proxy entity...
Marco Fiorenzi, Daniele Girella, Niels Möller...