نتایج جستجو برای: network security

تعداد نتایج: 818903  

2015
Seungwon Shin Haopei Wang Guofei Gu

Network security management is becoming more and more complicated in recent years, considering the need of deploying more and more network security devices/middle-boxes at various locations inside the already complicated networks. A grand challenge in this situation is that current management is inflexible and the security resource utilization is not efficient. The flexible deployment and utili...

Journal: :The Journal of the Institute of Television Engineers of Japan 1995

2010
Nikhil Shetty Galina Schwartz Jean C. Walrand

The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technologybased defences. Previous research suggests that, in such an environment, cyber-insurance may serve as an important tool not only to manage risks but also to improve the incentives for investment in security. This paper investigates how competitive cyber-insurers affe...

2013
Iznan Husainy Hasbullah Raja Kumar Murugesan Sureswaran Ramadass

IPv6 is a network layer protocol of the OSI reference model. IPv6 uses the Neighbor Discovery Protocol (NDP) that works on link local scope of IPv6 network. NDP covers host initialization and address auto configuration that is one of IPv6 advantages and other important functionalities. IPv6 mandates to support Internet Protocol Security (IPSec) for end‐to‐end communication security. However, th...

Journal: :International Journal of Online Engineering (iJOE) 2018

Journal: :IOSR Journal of Computer Engineering 2016

2011
Steven F. Blanding

INTRODUCTION Modern computer networks are characterized by layered protocol architectures, allowing network designs to accommodate unlimited applications and interconnection techniques. This layered approach allows protocols to become modularized; that is, developed independently and put together with other protocols in such a way as to create one complete protocol. The recognized basis of prot...

1996
Erich M. Nahum David J. Yates Sean W. O'Malley Hilarie K. Orman Richard Schroeppel

Security and privacy are growing concerns in the Internet community, due to the Internet’s rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All of these standards propose using cryptographic protocols such as DES and RSA. Thus, the need to us...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید