Sciweavers

621 search results - page 8 / 125
» Security of Internet Location Management
Sort
View
ICWS
2004
IEEE
13 years 8 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
GLOBECOM
2006
IEEE
14 years 1 months ago
Hierarchical Location Management for Transport Layer Mobility
— IP mobility can be handled at different layers of the protocol stack. Mobile IP has been developed to handle mobility of Internet hosts at the network layer. As an alternative ...
Shaojian Fu, Mohammed Atiquzzaman
SAC
2008
ACM
13 years 6 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
IJNSEC
2008
175views more  IJNSEC 2008»
13 years 7 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
COMSUR
2000
202views more  COMSUR 2000»
13 years 7 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman