Sciweavers

5511 search results - page 140 / 1103
» Security for Network Places
Sort
View
160
Voted
ACMSE
2008
ACM
15 years 5 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
130
Voted
ECUMN
2007
Springer
15 years 9 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
134
Voted
APVIS
2006
15 years 5 months ago
Visual analysis of network centralities
Centrality analysis determines the importance of vertices in a network based on their connectivity within the network structure. It is a widely used technique to analyse network-s...
Tim Dwyer, Seok-Hee Hong, Dirk Koschützki, Fa...
134
Voted
SMARTNET
2000
15 years 5 months ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun
135
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...