Sciweavers

478 search results - page 55 / 96
» Secure Sockets Layer
Sort
View
IC
2004
13 years 9 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
CSFW
2007
IEEE
14 years 1 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 7 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
ATAL
2004
Springer
14 years 29 days ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
ICSOC
2005
Springer
14 years 1 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...