Sciweavers

75 search results - page 13 / 15
» csreasam 2006
Sort
View
CSREASAM
2006
13 years 9 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
CSREASAM
2006
13 years 9 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
CSREASAM
2006
13 years 9 months ago
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
Li-Yen Hsu, Shin-Shin Kao
CSREASAM
2006
13 years 9 months ago
Using Aspects and Compilation Techniques to Dynamically Manage Applications
- The emergence of middleware solutions and new services even on small devices will need adapted distributed management solutions which address these specificities, both in terms o...
Bernard Kaddour, Joël Quinqueton