• Aucun résultat trouvé

[PDF] Top 20 Towards a Secure Email Service for The Future Internet

Has 10000 "Towards a Secure Email Service for The Future Internet" found on our website. Below are the top 20 most common "Towards a Secure Email Service for The Future Internet".

Towards a Secure Email Service for The Future Internet

Towards a Secure Email Service for The Future Internet

... approach for a new Internet architecture, like NetInf, is clearly an ...alternative. The proposed email service presented in this work is in the context of the ... Voir le document complet

7

Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet

Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet

... of the Future Internet is the efficient utilization of (wire- less) network ...order for the - demanding in terms of QoS - Future Internet services to be provided, ... Voir le document complet

21

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

... the CSPM receives a context and related information, it gets the corresponding policy from the Context Security Policies Base (CSPB) and sends it to the Context Security Policies ... Voir le document complet

13

Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ?

Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ?

... gaining the interest of the ...UDP Internet Connection). The main objective of the two protocols is to improve end-users quality of experience and communi- cations ...on the ... Voir le document complet

7

Blockchain and access control : towards a more secure Internet of Things

Blockchain and access control : towards a more secure Internet of Things

... using a generic provider-independent language that supports ...to the Cloud Service Provider (CSP, here AWS). The PDP and PEP function stay within the purview of the CSP, ... Voir le document complet

246

Malware: A future framework for Device, Network and Service Management

Malware: A future framework for Device, Network and Service Management

... components for current network and service management ...in a cost efficient way the management of large scale infrastructures with the current traditional approaches is no more ...On ... Voir le document complet

9

The Canadian Construction Materials Centre (CCMC): a service for building officials: past, present and future

The Canadian Construction Materials Centre (CCMC): a service for building officials: past, present and future

... Past For those not familiar with the beginnings of CCMC, it would be important to know that the Centre was established in 1988, under signed agreement with the majority of Provinces and ... Voir le document complet

6

Towards DisNETPerf: a Distributed Internet Paths Performance Analyzer

Towards DisNETPerf: a Distributed Internet Paths Performance Analyzer

... by the European Commission through the Seventh Framework Grant Agreements mPlane ...work for personal or classroom use is granted without fee provided that copies are not made or distributed ... Voir le document complet

3

Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"

Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"

... is a long history of protocols for outsourcing group exponentiations in different settings ...in the RSA setting of groups of secret unknown prime order (see [10], [7], [1], [9], [2], [3], [17], [4], ... Voir le document complet

5

Recommendations for a radically secure ISA

Recommendations for a radically secure ISA

... from a very simple pipeline to multithreaded cores with many different performance-oriented ...at the software-level involves being able to support all these different cases with the ...ISA. ... Voir le document complet

8

Fractal Grid – Towards the Future Smart Grid

Fractal Grid – Towards the Future Smart Grid

... compared the power grid with the built-up spatial ...compute the fractal dimension, the results were obtained using the box-counting method, which is a way of determining ... Voir le document complet

6

Nopoor. Towards a Decent and Fair Future

Nopoor. Towards a Decent and Fair Future

... to the Nopoor survey, approximately 55% of women report they have been mistreated by their ...are the most likely to experience psychological or physical ...at the neighbourhood level, higher educa- ... Voir le document complet

69

Towards Secure Agent Distribution and Communication

Towards Secure Agent Distribution and Communication

... of the better known Java-based mobile agent ...used for inter- agent communication in a number of ...away the communication interface to object exchange and remote method ...invocation. ... Voir le document complet

11

Toward a new ad hoc node design for secure service deployment over ad hoc network

Toward a new ad hoc node design for secure service deployment over ad hoc network

... providing service to each others. There can be two kinds of situations in the charging point of ...is the kind of a situation in which there is no need to use ...all the hosts have ... Voir le document complet

11

Multi-scale knowledge structuring: Towards an ubiquitous assistant for the factory of the future

Multi-scale knowledge structuring: Towards an ubiquitous assistant for the factory of the future

... that a knowledge based system has to forward and structure the knowledge in a proper format that corresponds to its consumer ability to perceive ...that the information has to be understand- ... Voir le document complet

9

Improving the Capabilities of Email for Businesses - The Case of Social Tagging

Improving the Capabilities of Email for Businesses - The Case of Social Tagging

... of the prototype’s main interface - Email Social Tagging service ...investigate the potential of the prototyped email social tagging service described in Section ... Voir le document complet

18

The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals

The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals

... finds a similar outcome in the case of knowl- edge professionals whose use of mobile email devices occurred at all times and ...to the literature in this area by highlighting the role ... Voir le document complet

22

Secure the Clones - Static Enforcement of Policies for Secure Object Copying

Secure the Clones - Static Enforcement of Policies for Secure Object Copying

... methods for half a dozen fields can be rewritten to dispatch these functionalities to the relevant classes, while retaining the ex- pected copy ...by the modularity of our enforcement ... Voir le document complet

21

Towards Secure and Trusted-by-Design Smart Contracts

Towards Secure and Trusted-by-Design Smart Contracts

... are the accountability of the evidence, its es- tablishment and its ...Therefore, the specification of evidential protocols requires being able to specify trust and accountability, which is ... Voir le document complet

16

Towards a Standards-Based Cloud Service Manager

Towards a Standards-Based Cloud Service Manager

... the service delivery stack starting from the underly- ing hardware ...paradigm the driver of information technology for the years to ...come. For the best of our ... Voir le document complet

8

Show all 10000 documents...