Sciweavers

5511 search results - page 25 / 1103
» Security for Network Places
Sort
View
140
Voted
IASTEDSEA
2004
15 years 4 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CSREASAM
2006
15 years 4 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
152
Voted
IEEEARES
2010
IEEE
15 years 1 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
130
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford
123
Voted
SPW
2001
Springer
15 years 8 months ago
Towards a Survivable Security Architecture for Ad-Hoc Networks
Tuomas Aura, Silja Mäki