Sciweavers

218 search results - page 20 / 44
» Voice-over-IP Security: Research and Practice
Sort
View
CCR
2006
116views more  CCR 2006»
13 years 8 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
ACSAC
2010
IEEE
13 years 6 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
IJISEC
2008
69views more  IJISEC 2008»
13 years 8 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
PPNA
2011
13 years 3 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
ATAL
2006
Springer
13 years 10 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate