Sciweavers

1779 search results - page 309 / 356
» Secure Communications in ATM Networks
Sort
View
DSN
2006
IEEE
14 years 1 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
ACMSE
2006
ACM
14 years 1 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
WOTUG
2007
13 years 9 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the ...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
PERVASIVE
2004
Springer
14 years 1 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
DIM
2007
ACM
13 years 11 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß