Results 141 to 150 of about 462,961 (193)
Some of the next articles are maybe not open access.

Towards security metrics-supported IP traceback

Proccedings of the 10th European Conference on Software Architecture Workshops, 2016
The threat of DDOS and other cyberattacks has increased during the last decade. In addition to the radical increase in the number of attacks, they are also becoming more sophisticated with the targets ranging from ordinary users to service providers and even critical infrastructure.
Savolainen, Pekka   +3 more
openaire   +3 more sources

Security issues with TCP/IP

ACM SIGAPP Applied Computing Review, 1995
An introduction to network security , basic definitions and aa brief discussion of the architecture of TCP/IP as well as the Open System Intercornnection(OSI) Reference Model open the paper. The relationship between TCP/IP and of some OSI layers is described.
Renqi Li, E. A. Unger
openaire   +1 more source

Fast, Secure Failover for IP

2014 IEEE Military Communications Conference, 2014
We describe a mechanism for fast, secure failover for IP. The mechanism is invisible to end-systems: sessions are maintained during failover. Our novel approach is to model the failover as a mobility problem, and use a mobility solution in order to implement change in connectivity. Our system is based on the Identity Locator Network Protocol (ILNP), an
Saleem N. Bhatti   +2 more
openaire   +1 more source

A Survey on Wireless Security: IP Security Concern

2016
TCP/IP protocol suite is used to transfer the information among various networks/users located at remote sites. The transfer of information can be subjected to a lot of vulnerabilities, which can be overcome by providing authentication, confidentiality, integrity, etc. The TCP/IP has been implemented with IPSec to provide protection to packets that are
null Garima Chopra   +2 more
openaire   +1 more source

Mobile IP and security

2021
MOBILE IP AND SECURITY SUMMARY Computer networks have been one of the most significant revolution of twentieth century. They have come to play an increasingly important role in modern life. The motivation for the widespread use of computer networks has been the need for communication between people for their common and shared interests.
openaire   +1 more source

IP Storage Security Analysis

2012
The paper presents analysis of different methods used to protect IP storage systems. The problem is, if the existing tools and methods for securing common Internet services like WWW, VoIP are suitable to IP storage system protection? The necessary security services such as: authentication, integrity and encryption may be provided in many different ways.
openaire   +1 more source

Secure Initialization Vector Transmission on IP Security

2005
IPSec is a security protocol suite that provides encryption and authentication for IP messages at the network layer of the Internet. ESP Protocol that is one of the two major protocols of IPSec offers encryption as well as optional authentication and integrity of IP Payloads.
openaire   +1 more source

Securing IP networks

Network Security, 2010
Sindhu Xirasagar, Masoud Mojtahed
openaire   +1 more source

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi   +2 more
exaly  

Securing voice over IP

IEEE Network, 2006
R. Dantu, D. Ghosal, H. Schulzrinne
openaire   +1 more source

Home - About - Disclaimer - Privacy