Sciweavers

2562 search results - page 312 / 513
» An Internet without the Internet protocol
Sort
View
COMCOM
2006
75views more  COMCOM 2006»
13 years 10 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
IEICET
2006
109views more  IEICET 2006»
13 years 10 months ago
Capacity of VoIP over HSDPA with Frame Bundling
In this paper, we evaluate the capacity of voice over internet protocol (VoIP) services over high-speed downlink packet access (HSDPA), in which frame-bundling (FB) is incorporated...
Yong-Seok Kim
ENTCS
2007
112views more  ENTCS 2007»
13 years 10 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
JSAC
2006
103views more  JSAC 2006»
13 years 10 months ago
Quality-of-service provisioning and efficient resource utilization in CDMA cellular communications
One of the major challenges in supporting multimedia services over Internet protocol (IP)-based code-division multiple-access (CDMA) wireless networks is the quality-of-service (Qo...
Hai Jiang, Weihua Zhuang, Xuemin Shen, Qi Bi
IJDE
2007
77views more  IJDE 2007»
13 years 10 months ago
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP...
Omer Demir, Ping Ji, Jinwoo Kim