Sciweavers

2207 search results - page 86 / 442
» Security at the Internet Layer
Sort
View
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 7 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
163
Voted
DRM
2006
Springer
15 years 7 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
ICWS
2004
IEEE
15 years 5 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
131
Voted
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 4 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
AINA
2008
IEEE
15 years 10 months ago
On Constructing High Performance Overlay for Layered Streaming in Heterogeneous Networks
This paper presents the mechanism and evaluation of a Qos-aware Overlay Construction Approach for Layered Streaming, called OCals. The motivation originates from the lack of overl...
Xin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang