Sciweavers

3089 search results - page 429 / 618
» services 2008
Sort
View
SECON
2008
IEEE
15 years 10 months ago
Cooperative Recovery in Heterogeneous Mobile Networks
Abstract—In multicast/broadcast services over infrastructurebased/cellular wireless networks (e.g. 3G cellular networks, WiMax, DVB), data is transmitted to multiple recipients f...
Kaustubh Sinkar, Amit Jagirdar, Thanasis Korakis, ...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 10 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
CCS
2008
ACM
15 years 5 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CISSE
2008
Springer
15 years 5 months ago
IraqComm and FlexTrans: A Speech Translation System and Flexible Framework
SRI International's IraqComm system performs bidirectional speech-to-speech machine translation between English and Iraqi Arabic in the domains of force protection, municipal ...
Michael W. Frandsen, Susanne Riehemann, Kristin Pr...
138
Voted
DEBS
2008
ACM
15 years 5 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...