Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

kw.\*:("Servidor proxy")

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 268

  • Page / 11
Export

Sélection :

  • et

L7-mobility : A framework for handling mobility at the application levelTOURRILHES, Jean.IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. 2004, pp 1246-1251, isbn 0-7803-8523-3, 4Vol, 6 p.Conference Paper

Access When AND Where They Want It : Using EZproxy to Serve Our Remote UsersLAWRENCE, Peg.Computers in libraries. 2009, Vol 29, Num 1, issn 1041-7915, 6-7, 41-43 [5 p.]Article

Testing the Off-Site Experience, or, How Well Do You Proxy?RIBARIC, Tim J.Computers in libraries. 2009, Vol 29, Num 1, pp 18-21, issn 1041-7915, 4 p.Article

Proxy signature scheme with multiple original signers for wireless E-commerce applicationsGUILIN WANG; FENG BAO; JIANYING ZHOU et al.IEEE Vehicular Technology Conference. 2004, pp 3249-3253, isbn 0-7803-8521-7, 5 p.Conference Paper

Adaptive border sampling for hardware texture-based volume visualizationLAMAR, Eric.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 606005.1-606005.8, issn 0277-786X, isbn 0-8194-6100-8, 1VolConference Paper

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random OraclesLU, Steve; OSTROVSKY, Rafail; SAHAI, Amit et al.Journal of cryptology. 2013, Vol 26, Num 2, pp 340-373, issn 0933-2790, 34 p.Article

An efficient and provably secure proxy signature schemeJIANHONG ZHANG; XUE LIU; SHENGNAN GAO et al.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7820, issn 0277-786X, isbn 978-0-8194-8329-4 0-8194-8329-X, 2Vol, 782031.1-782031.8, 2Conference Paper

A network address translation approach to the inbound session problem in private networksHSIEH, Ming-Deng; CHANG, Hung-Chun; TSENG, Chien-Chao et al.IEICE transactions on information and systems. 2007, Vol 90, Num 2, pp 482-489, issn 0916-8532, 8 p.Article

Capability-based egress network access control by using DNS server : Information technologySUZUKI, Shinichi; SHINJO, Yasushi; HIROTSU, Toshio et al.Journal of network and computer applications. 2007, Vol 30, Num 4, pp 1275-1282, issn 1084-8045, 8 p.Conference Paper

Improved transport layer performance enhancing proxy for wireless networksHUANG, Jeng-Ji; FERNG, Huei-Wen.IEICE transactions on communications. 2006, Vol 89, Num 1, pp 206-209, issn 0916-8516, 4 p.Article

Segment-based streaming media proxy : Modeling and optimization : Distributed media technologies and applicationsSONGQING CHEN; BO SHEN; WEE, Susie et al.IEEE transactions on multimedia. 2006, Vol 8, Num 2, pp 243-256, issn 1520-9210, 14 p.Article

The use of satellite for multimedia communicationsFITCH, M.BT technology journal. 2003, Vol 21, Num 3, pp 90-101, issn 1358-3948, 12 p.Article

A coherence-replacement protocol for web proxy cache systemsAGUILAR, J; LEISS, E. L.International journal of computers & applications. 2006, Vol 28, Num 1, pp 12-18, issn 1206-212X, 7 p.Article

Cryptanalysis of A proxy-protected proxy signature scheme based on elliptic curve cryptosystemSHUHONG WANG; GUILIN WANG; FENG BAO et al.IEEE Vehicular Technology Conference. 2004, pp 3240-3243, isbn 0-7803-8521-7, 4 p.Conference Paper

Heavy tail distribution in E-Mail networkYIHJIA TSAI; LIN, Ching-Chang; HSIAO, Ping-Nan et al.SoftCOM 2002 : international conference on software, telecommunications and computer networksSoftCOM 2002 : international conference on software, telecommunications and computer networks. 2002, pp 167-170, isbn 953-6114-52-6, 4 p.Conference Paper

Mise en œuvre d'un proxy : Fonctions avancées = Proxy implementation : Advanced functionsLEVIER, Laurent.Techniques de l'ingénieur. Télécoms. 2008, Vol TEA3, Num TE7707, issn 1632-3823, TE7707.1-TE7707.10Article

Mise en œuvre d'un proxy : Installation = Proxy implementation : InstallationLEVIER, Laurent.Techniques de l'ingénieur. Télécoms. 2008, Vol TEA3, Num TE7706, issn 1632-3823, TE7706.1-TE7706.8, docTE7706.1 [9 p.]Article

A multikey secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementationYEUNG, Siu F; LUI, John C. S; YAU, David K. Y et al.IEEE transactions on multimedia. 2005, Vol 7, Num 2, pp 330-338, issn 1520-9210, 9 p.Article

Adapting Web pages for small-screen devicesYU CHEN; XING XIE; MA, Wei-Ying et al.IEEE internet computing. 2005, Vol 9, Num 1, pp 50-56, issn 1089-7801, 7 p.Article

A new hierarchical based approach mailing list systemCHOMJAN, Suchada; KHUNKITTI, Akharin.International conference on information and communication technologies. 2003, pp 180-184, isbn 974-615-089-8, 1Vol, 5 p.Conference Paper

An efficient secure proxy verifiably encrypted signature schemeJIANHONG ZHANG; CHENGLIAN LIU; YIXIAN YANG et al.Journal of network and computer applications. 2010, Vol 33, Num 1, pp 29-34, issn 1084-8045, 6 p.Article

ID-based designated-verifier proxy signaturesCAO, T; LIN, D; XUE, R et al.IEE proceedings. Communications. 2005, Vol 152, Num 6, pp 989-994, issn 1350-2425, 6 p.Article

Field Demonstration of Dynamic Circuit Provisioning by Web Services Interface Proxy for Lambda and Ethernet based Administrative DomainsMIYAMOTO, Takahiro; TANAKA, Jin; OTSUKI, Hideki et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 7989, issn 0277-786X, isbn 978-0-8194-8557-1, 79890F.1-79890F.6Conference Paper

SNMP based proxy for secure Network ManagementBAZANT, Alen; GRACIN, Josip; VRDOLJAK, Igor-Zdenko et al.SoftCOM 2002 : international conference on software, telecommunications and computer networksSoftCOM 2002 : international conference on software, telecommunications and computer networks. 2002, pp 646-650, isbn 953-6114-52-6, 5 p.Conference Paper

Public key encryption schemes supporting equality test with authorisation of different granularityQIANG TANG.International journal of applied cryptography (Print). 2012, Vol 2, Num 4, pp 304-321, issn 1753-0563, 18 p.Article

  • Page / 11