Sciweavers

5511 search results - page 140 / 1103
» Security for Network Places
Sort
View
ACMSE
2008
ACM
14 years 24 days ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
ECUMN
2007
Springer
14 years 5 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
APVIS
2006
14 years 6 days ago
Visual analysis of network centralities
Centrality analysis determines the importance of vertices in a network based on their connectivity within the network structure. It is a widely used technique to analyse network-s...
Tim Dwyer, Seok-Hee Hong, Dirk Koschützki, Fa...
SMARTNET
2000
14 years 4 days ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun
MOBICOM
2010
ACM
13 years 11 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...