Sciweavers

2207 search results - page 85 / 442
» Security at the Internet Layer
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
15 years 10 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
15 years 9 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya
SEMWEB
2001
Springer
15 years 8 months ago
Metamodeling Architecture of Web Ontology Languages
Recent research has shown that RDF Schema, as a schema layer Semantic Web language, has a non-standard metamodeling architecture. As a result, it is difficult to understand and la...
Jeff Z. Pan, Ian Horrocks
107
Voted
VRML
1998
ACM
15 years 8 months ago
Looking Inside VRwave: The Architecture and Interface of the VRwave VRML97 Browser
This paper presents an inside look into the VRwave VRML97 browser, discussing its internal architecture and some of the insights we have gained during its development. VRwave is w...
Keith Andrews, Andreas Pesendorfer, Michael Pichle...
NGC
2002
Springer
15 years 3 months ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert