Sciweavers

37 search results - page 1 / 8
» Securing Internet Protocol (IP) Storage: A Case Study
Sort
View
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 5 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty
VISUALIZATION
2002
IEEE
13 years 9 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
CCS
2009
ACM
14 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
COMCOM
2007
106views more  COMCOM 2007»
13 years 4 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
INFOCOM
2006
IEEE
13 years 11 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne