Sciweavers

5324 search results - page 755 / 1065
» Internet Security Protocols
Sort
View
CEAS
2007
Springer
14 years 5 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
ECUMN
2007
Springer
14 years 5 months ago
Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM
Multimedia group communication emerges to focal interest at mobile devices, enriching voice or video conferencing and complex collaborative environments. The Internet uniquely pro...
Thomas C. Schmidt, Matthias Wählisch, Hans L....
QOFIS
2004
Springer
14 years 4 months ago
Cross-Layer Analytical Modeling of Wireless Channels for Accurate Performance Evaluation
Abstract. An intention to adopt IP protocol for future mobile communication and subsequent extension of Internet services to the air interface calls for advanced performance modeli...
Dmitri Moltchanov, Yevgeni Koucheryavy, Jarmo Harj...
WAC
2004
Springer
14 years 4 months ago
A Unified Framework for the Negotiation and Deployment of Network Services
The Internet network technology today does not allow a sufficient degree of autonomy to express user choices, constraints and preferences in order to dynamically obtain the most su...
Spyros G. Denazis, Lidia Yamamoto
ISCC
2003
IEEE
14 years 4 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...