Sciweavers

590 search results - page 54 / 118
» Security Issues in VOIP Applications
Sort
View
PERCOM
2010
ACM
13 years 6 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
DAGSTUHL
2006
13 years 9 months ago
Nonlinear Transaction Pricing in the Securities Trading Value Chain
Most of the research on transaction costs in the market microstructure literature focuses on implicit transaction costs. Research on the design of price schedules for explicit tra...
Matthias Burghardt
JTAER
2007
125views more  JTAER 2007»
13 years 7 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
SASN
2003
ACM
14 years 1 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
GRID
2005
Springer
14 years 1 months ago
An end-to-end Web services-based infrastructure for biomedical applications
— Services-oriented architectures hold a lot of promise for grid-enabling scientific applications. In recent times, Web services have gained wide-spread acceptance in the Grid c...
Sriram Krishnan, Kim Baldridge, Jerry P. Greenberg...