Sciweavers

279 search results - page 21 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 2 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
CCS
2007
ACM
14 years 2 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
ATAL
2005
Springer
14 years 1 months ago
Protocol synthesis with dialogue structure theory
Inspired by computational linguistic approaches to annotate the structures that occur in human dialogue, this paper describes a technique which encodes these structures as transfo...
Jarred McGinnis, David Robertson, Christopher Walt...
COMCOM
2006
78views more  COMCOM 2006»
13 years 8 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long