Sciweavers

2562 search results - page 112 / 513
» An Internet without the Internet protocol
Sort
View
WWW
2009
ACM
14 years 11 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
GLOBECOM
2007
IEEE
14 years 4 months ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...
ACSC
2009
IEEE
14 years 2 months ago
Verification of the SIP Transaction Using Coloured Petri Nets
The Session Initiation Protocol (SIP) is one of the leading protocols for multimedia control over the Internet, including initiating, maintaining and terminating multimedia sessio...
Lin Liu
ECOWS
2007
Springer
14 years 2 days ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
WISE
2005
Springer
14 years 3 months ago
Towards the Automation of E-Negotiation Processes Based on Web Services - A Modeling Approach
Abstract. E-Negotiation is the process of conducting negotiations between business partners using electronic means. The interest in e-negotiation is motivated by its potential to p...
Stefanie Rinderle, Morad Benyoucef