Filters








751 Hits in 4.2 sec

Authentication in office system internetworks

Jay E. Israel, Theodore A. Linden
1983 ACM Transactions on Information Systems  
Requirements and design constraints when applying encryption for authentication in office systems are discussed.  ...  In a distributed office system, authentication data (such as passwords) must be managed in such a way that users and machines from different organizations can easily authenticate themselves to each other  ...  ACKNOWLEDGMENTS Many colleagues contributed to the design concepts discussed in this paper and to the initial implementation.  ... 
doi:10.1145/357436.357437 fatcat:kagxld5fu5bnngyyy7deewyxje

Development of an effective remote interactive laboratory for online internetworking education

S.C. Sivakumar, W. Robertson
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
The Faculty of Engineering at Dalhousie University, Halifax, Canada has been offering a Master's degree program in Internetworking since 1997.  ...  needs of the Internetworking courses.  ...  using Teraterm [14] , VNC software, and MS Office suite and c) Broadband access of 56 kbps per remote PC.  ... 
doi:10.1109/hicss.2004.1265054 dblp:conf/hicss/SivakumarR04 fatcat:cwvtuiwhuzacncyznsuydrjpoi

Minimizing dependency on internetwork: Is dew computing a solution?

Partha Pratim Ray
2018 Transactions on Emerging Telecommunications Technologies  
From earlier published literary works, a taxonomy has been devised in the dominion of dew computing.  ...  Several application perspectives are in practice that mandate the involvement of application domains including smart retail, transportation, and data analytics.  ...  In this manner, larger computing services can be provided by the dew systems with minimal network latency and use of internetwork connectivity.  ... 
doi:10.1002/ett.3496 fatcat:gz7nlw4q2zbp5dwkv5vbnrls2u

A Transport and Application-layer Approach to Seamless Service Continuity across Heterogeneous Wireless Networks

Carlos García-Rubio, Celeste Campo
2006 International Conference on Ubiquitous Computing  
Several topics need to be addressed, including authentication, security, QoS support, and mobility management.  ...  In this paper we review the alternative architectures proposed so far to solve this problem, with their advantages and disadvantages.  ...  home or office, or while in the move.  ... 
dblp:conf/icuc/Garcia-RubioC06 fatcat:biaakg4oqbf6naupnxfmgymnxm

RCM: A User Friendly Router Configuration Machine

Samreen Amir, B. S. Chowdhry, Ilyas Gichki, Obaid Shakeel
2013 Wireless personal communications  
It communicates with the Cisco Internetwork Operating System to configure the router. It includes the configuration for all interior routing protocols and all types of most common used tools.  ...  In this paper a router configuration machine for Cisco routers using GUI is presented.  ...  Virtually all of Cisco's products run the Internetwork Operating System (IOS). This is both a great advantage and a great disadvantage.  ... 
doi:10.1007/s11277-013-1063-6 fatcat:wwllr3hca5hefhzwuacwczoy6e

Issues and challenges in securing VoIP

Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João Cangussu
2009 Computers & security  
In this article, we discuss these security problems and propose a high-level security architecture that captures required features at each boundary-network-element in the VoIP infrastructure.  ...  We describe mechanisms to efficiently integrate information between distributed security components in the architecture.  ...  Thus, system administrators must take great care when plugging security gaps created by the internetworking of VoIP and PSTN. 6.  ... 
doi:10.1016/j.cose.2009.05.003 fatcat:7lch4elibnfaffeqafdnzo56g4

Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3

Andi Harits, Moch. Fahru Rizal, Periyadi Periyadi
2017 IJAIT (International Journal of Applied Information Technology)  
The results shows that the combination of Frame Relay, OSPF andMPLS generates better performance as well as significant improvement in networksecurity.  ...  demand for efficient and resilient network, and to emphasize the advantages of MPLS-OSP as well as to avoid traffic shifting, specific network topology models are applied: full mesh with virtual circuit in  ...  with proposed system.  ... 
doi:10.25124/ijait.v1i02.869 fatcat:opjsb5e46nfbbg3josol6pkvra

Security for virtual private intranets

W.A. Arbaugh, J.R. Davin, D.J. Farber, J.M. Smith
1998 Computer  
We thank Harold Bower for assisting us in programming the BIOS implementation of Aegis and the anonymous reviewers for their helpful comments.  ...  that reside in remote offices.  ...  Businesses, however, are facing a major challenge in extending the office network environment to employees' homes.  ... 
doi:10.1109/2.708450 fatcat:aqvbciffnbhobfqesujgfnmg4m

A guide to computer network security

2013 ChoiceReviews  
Evidence 291 13.8 Challenges to Intrusion Detection Systems 291 13.8.1 Deploying IDS in Switched Environments 292 13.9 Implementing an Intrusion Detection System 292 13.10 Intrusion Prevention  ...  Authentication 212 10.4.2 Repudiable Authentication 213 10.5 Authentication Methods 213 10.5.1 Password Authentication 214 10.5.2 Public-Key Authentication 216 10.5.3 Remote Authentication  ... 
doi:10.5860/choice.51-2126 fatcat:y35krcpg7zes3nd5blrix7yv5a

Internetworking Objects with RFID [chapter]

Rune Hylsberg, Qi Zhang, Thomas Skjdebjerg
2011 Deploying RFID - Challenges, Solutions, and Open Issues  
Authentication is difficult in the Internet of Things as it requires appropriate authentication infrastructures that will not be available in Internet of Things scenarios.  ...  More sophisticated devices engage in challenge-response authentication scheme where the tag interacts with the reader.  ... 
doi:10.5772/18223 fatcat:msdm2rjgtbhprfaxpxgzh4dmhi

Book Reviews: Cisco Mobile IP Configuration, Troubleshooting, and Management

R. Puzmanova
2006 IEEE Distributed Systems Online  
They explain the Mobile Internet Protocol in detail to the level of message flows.  ...  In Mobile IP Technology and Applications, Stefan Raab and Madhavi W. Chandra clearly define mobility and its requirements.  ...  Raab and Chandra concentrate on configuration and management of Cisco clients, so they introduce IOS (Internetwork Operating System) command scripts wherever possible to support Cisco Mobile IP networks  ... 
doi:10.1109/mdso.2006.24 fatcat:o72u7n5aevgjhll2bsv3pboasq

Security solutions in VoIP applications: State of the art and impact on quality

Susanna Spinsante, Ennio Gambi, Emanuele Bottegoni
2008 2008 IEEE International Symposium on Consumer Electronics  
Finally some methods have been proposed to improve the security in the VoIP applications in future state.  ...  Unfortunately in the other extreme, some security issues may come across with the extensive use of VoIP.  ...  Thus, system administrators must take great care when plugging security gaps created by the internetworking of VoIP and PSTN.  ... 
doi:10.1109/isce.2008.4559474 fatcat:nsv2vmsctnbjlkyihkntzqy4aq

INCORPORATING BIOMETRIC AUTHENTICATION MECHANISM IN THE VOTING SYSTEM

A. Jenita Mary
2018 International Journal of Advanced Research in Computer Science  
An online voting system is to avoid multiple polling and irregularities at counting location. Currently, the voting system in India is inefficient and vulnerable to outer threats.  ...  Since the fingerprint pattern is unique for humans, the authentication is done easily and duplicating such pattern is highly impossible. The system allows the voter to login through the fingerprint.  ...  In this research work, fingerprint authentication method is used a part of voting system to avoid the difficulties faced by the government.  ... 
doi:10.26483/ijarcs.v9i1.5394 fatcat:xe5r5i5u2vhbjbnbu3mjjzs3fm

Seamless internetworking of WLANs and cellular networks: architecture and performance issues in a mobile IPv6 scenario

M. Bernaschi, F. Cacace, G. Iannello, S. Za, A. Pescape
2005 IEEE personal communications  
ACKNOWLEDGMENTS This work was funded in part by the Minstero dell'Istruzione, dell'Università e della Ricerca (MIUR) with the FIRB project WEB-MINDS and by the European Community's Sixth Framework Programme  ...  Such integration, however, requires the solution of problems at different levels: from the definition of an internetworking architecture to the management of user authentication and billing.  ...  Authentication and security issues are handled by the VPN application, and we do not consider these issues in the sequel.  ... 
doi:10.1109/mwc.2005.1452857 fatcat:3bc4ee6hknhqli2gk6cy4oryli

An Approach for Secure Data Storage in Cloud Environment

M. Gobi
2013 International Journal of Computer and Communication Engineering  
Confidentiality, Integrity, Authenticity and Privacy are essential concerns for both Cloud Service Providers and consumers as well.  ...  This paper proposes a scheme for enhancing the data authenticity, privacy and integrity of cloud data with the aid of an encryption scheme and a hash function which uses message digest.  ...  The important keys to security of cloud computing encompasses Security, Confidentiality, Authenticity, Privacy and Integrity of the data stored in cloud.  ... 
doi:10.7763/ijcce.2013.v2.171 fatcat:k5367biwefemjc75mbhplxuohu
« Previous Showing results 1 — 15 out of 751 results