Sciweavers

590 search results - page 12 / 118
» Security Issues in VOIP Applications
Sort
View
SP
1989
IEEE
13 years 12 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
IEICET
2006
131views more  IEICET 2006»
13 years 7 months ago
Quick Data-Retrieving for U-APSD in IEEE802.11e WLAN Networks
The IEEE802.11e defines a MAC protocol, which provides EDCA (enhanced distributed channel access) and HCCA (HCF controlled channel access) to support differentiation service over W...
Shojiro Takeuchi, Kaoru Sezaki, Yasuhiko Yasuda
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
14 years 25 days ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 1 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
NDSS
2008
IEEE
14 years 2 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu