Sciweavers

1256 search results - page 49 / 252
» A Simple E-Voting Protocol
Sort
View
85
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
97
Voted
COMPSAC
2005
IEEE
15 years 6 months ago
A Comparison of Network Level Fault Injection with Code Insertion
This paper describes our research into the application of fault injection to Simple Object Access Protocol (SOAP) based Service Oriented-Architectures (SOA). We show that our prev...
Nik Looker, Malcolm Munro, Jie Xu
APN
2006
Springer
15 years 4 months ago
The BRITNeY Suite Animation Tool
Abstract. This paper describes the BRITNeY suite, a tool which enables users to create visualizations of formal models. BRITNeY suite is integrated with CPN Tools, and we give an e...
Michael Westergaard, Kristian Bisgaard Lassen
86
Voted
EUROSSC
2006
Springer
15 years 4 months ago
A Simulation Study of Integrated Service Discovery
The research in the field of service discovery in mobile ad-hoc networks is characterised by a lack of quantitative research. Many ideas have been put forward but few have been tes...
Gertjan P. Halkes, Aline Baggio, Koen Langendoen
NGC
2002
Springer
15 years 14 days ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert