Sciweavers

230 search results - page 4 / 46
» host 2009
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 2 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
LREC
2010
144views Education» more  LREC 2010»
13 years 9 months ago
Community-based Construction of Draft and Final Translation Corpus Through a Translation Hosting Site Minna no Hon'yaku (MNH)
In this paper we report a way of constructing a translation corpus that contains not only source and target texts, but draft and final versions of target texts, through the transl...
Takeshi Abekawa, Masao Utiyama, Eiichiro Sumita, K...
ICDCSW
2009
IEEE
14 years 2 months ago
Dynamic TCP Proxies: Coping with Disadvantaged Hosts in MANETs
Applications in mobile ad-hoc networks can suffer from poor link quality and degraded network services. In particular, standard TCP over low-quality, long routing paths, can have ...
Tu Ouyang, Shudong Jin, Michael Rabinovich
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 2 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
MSWIM
2009
ACM
14 years 2 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...