Sciweavers

5511 search results - page 25 / 1103
» Security for Network Places
Sort
View
IASTEDSEA
2004
13 years 11 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CSREASAM
2006
13 years 11 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
IEEEARES
2010
IEEE
13 years 8 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
SIGCOMM
2009
ACM
14 years 4 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford