Sciweavers

55 search results - page 2 / 11
» Securing Internet Sessions with Sorbet
Sort
View
MMNS
2003
113views Multimedia» more  MMNS 2003»
13 years 6 months ago
Secure Inclusion of Phones Into Online E-meetings
Online Internet based e-meetings for synchronous communication is becoming more and more common and the need for secure communication is a strong requirement from both corporate a...
Peter Parnes
IJIIDS
2010
91views more  IJIIDS 2010»
13 years 2 months ago
On the security of reliable server pooling systems
: In order to cope with the requirements of availability-critical internet services, reliable server pooling (RSerPool) has been developed as the new IETF standard for a lightweigh...
Thomas Dreibholz, Xing Zhou, Martin Becke, Jobin P...
DFN
2004
13 years 6 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker
CSREASAM
2006
13 years 6 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
COMCOM
2007
106views more  COMCOM 2007»
13 years 5 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis