Sciweavers

5324 search results - page 26 / 1065
» Internet Security Protocols
Sort
View
INTERNET
2002
134views more  INTERNET 2002»
13 years 7 months ago
Developing Secure Web Applications
David Scott, Richard Sharp
INTERNET
1998
116views more  INTERNET 1998»
13 years 7 months ago
Mobile Code Security
Aviel D. Rubin, Daniel E. Geer Jr.
COMCOM
2007
106views more  COMCOM 2007»
13 years 7 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
INFOCOM
1996
IEEE
13 years 11 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
IACR
2011
128views more  IACR 2011»
12 years 7 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang