Sciweavers

3089 search results - page 458 / 618
» services 2008
Sort
View
101
Voted
JNW
2008
104views more  JNW 2008»
15 years 3 months ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...
122
Voted
JNW
2008
129views more  JNW 2008»
15 years 3 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
139
Voted
CSI
2007
86views more  CSI 2007»
15 years 3 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray
165
Voted
CSI
2007
192views more  CSI 2007»
15 years 3 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
136
Voted
JNW
2008
97views more  JNW 2008»
15 years 3 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews