Sciweavers

590 search results - page 103 / 118
» Security Issues in VOIP Applications
Sort
View
LCN
2005
IEEE
14 years 1 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
ICDCIT
2005
Springer
14 years 1 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
SDMW
2005
Springer
14 years 1 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
SYSTOR
2010
ACM
14 years 21 days ago
Operating system virtualization: practice and experience
Operating system (OS) virtualization can provide a number of important benefits, including transparent migration of applications, server consolidation, online OS maintenance, and...
Oren Laadan, Jason Nieh
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
14 years 5 days ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara