Sciweavers

5324 search results - page 21 / 1065
» Internet Security Protocols
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
SIGCOMM
2010
ACM
13 years 7 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 7 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 7 months ago
Comparative Study of Protocols Used for Establishing VPN
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also beco...
P. Venkateswari, T. Purusothaman
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung