Sciweavers

2207 search results - page 94 / 442
» Security at the Internet Layer
Sort
View
COOTS
1998
15 years 5 months ago
Java Transactions for the Internet
The Web frequently suffers from failures which affect the performance and consistency of applications run over it. An important fault-tolerance technique is the use of atomic tran...
Mark C. Little, Santosh K. Shrivastava
ISPEC
2005
Springer
15 years 9 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 10 months ago
An Improved TCP Migrate Scheme with DNS Handover Assistant for End-to-End Mobility
— As a transport layer mobility solution, the TCP Migrate allows mobile nodes to remain reachable and retain existing connections while changing their point of attachment to the ...
Yi Wu, Yanqun Le, Dongmei Zhang
LADC
2007
Springer
15 years 10 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
COMCOM
2004
83views more  COMCOM 2004»
15 years 4 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li