Sciweavers

849 search results - page 81 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ICNP
1998
IEEE
14 years 11 hour ago
Signaling for Internet Telephony
Internet telephony must offer the standard telephony services. However, the transition to Internetbased telephony services also provides an opportunity to create new services more...
Henning Schulzrinne, Jonathan D. Rosenberg
WISTP
2010
Springer
14 years 2 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
DANCE
2002
IEEE
14 years 21 days ago
Design and Evaluation of a High Performance Dynamically Extensible Router
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 7 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
HPDC
2005
IEEE
14 years 1 months ago
Design and evaluation of a new and effective fairness scheme for multicasting in Internet-scale distributed systems
This paper argues that simply applying a multipletree scheme does not provide sufficient fairness for applications in an Internet-scale distributed system, in terms of performance...
Yijun Lu, Hong Jiang