Sciweavers

621 search results - page 46 / 125
» Security of Internet Location Management
Sort
View
112
Voted
WORM
2003
15 years 5 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
126
Voted
WWW
2008
ACM
16 years 4 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
134
Voted
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
15 years 9 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...
ICC
2011
IEEE
269views Communications» more  ICC 2011»
14 years 3 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
136
Voted
ICDCIT
2004
Springer
15 years 9 months ago
Distributing Key Updates in Secure Dynamic Groups
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in group membership, the group controller needs to change and distribute the keys used...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar