Sciweavers

4305 search results - page 729 / 861
» Analysing Protocol Implementations
Sort
View
113
Voted
ECUMN
2007
Springer
15 years 10 months ago
Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM
Multimedia group communication emerges to focal interest at mobile devices, enriching voice or video conferencing and complex collaborative environments. The Internet uniquely pro...
Thomas C. Schmidt, Matthias Wählisch, Hans L....
148
Voted
ESAS
2007
Springer
15 years 10 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
121
Voted
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
136
Voted
EUROPAR
2007
Springer
15 years 10 months ago
Virtualization Techniques in Network Emulation Systems
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster env...
Roberto Canonico, Pasquale Di Gennaro, Vittorio Ma...
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 10 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot