Sciweavers

1639 search results - page 78 / 328
» internet 2006
Sort
View
FCS
2006
13 years 11 months ago
Naming and its Regularities in Distributed Environments
: Many of the Internet's problems are related to names. There are many empirical ideas of the further development of naming on the Internet. However, there are no theoretical ...
Mark Burgin, Anshul Taldon
WWW
2006
ACM
14 years 10 months ago
Live URLs: breathing life into URLs
This paper provides a novel approach to use URI fragment identifiers to enable HTTP clients to address and process content, independent of its original representation. Categories ...
Natarajan Kannan, Toufeeq Hussain
MONET
2002
142views more  MONET 2002»
13 years 9 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
WWW
2006
ACM
14 years 10 months ago
Strong authentication in web proxies
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
Domenico Rotiroti
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic