Sciweavers

590 search results - page 25 / 118
» Security Issues in VOIP Applications
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Forum Session: Security for Wireless Sensor Networks
Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. Proposed applications of these networks range from health care to...
David Carman, Daniel Coffin, Bruno Dutertre, Vipin...
CSFW
2008
IEEE
13 years 9 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
JCS
2002
118views more  JCS 2002»
13 years 7 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
MASCOTS
2008
13 years 9 months ago
TCP over WiMAX: A Measurement Study
We present active measurement results from a commercial IEEE 802.16/WiMAX-based network, with primary focus on TCP performance. We compare four TCP variants, namely New Reno, Cubi...
Emir Halepovic, Qian Wu, Carey L. Williamson, Maji...
OOPSLA
2005
Springer
14 years 1 months ago
Scopira: an open source C++ framework for biomedical data analysis applications -- a research project report
In MRI research labs, algorithms are typically implemented in MATLAB or IDL. If performance is an issue they are ported to C and integrated with interpreted systems, not fully uti...
Aleksander B. Demko, Rodrigo A. Vivanco, Nicolino ...