Sciweavers

967 search results - page 12 / 194
» COSY communication IP's
Sort
View
SIGCOMM
1995
ACM
15 years 1 months ago
aItPm: A Strategy for Integrating IP with ATM
Guru M. Parulkar, Douglas C. Schmidt, Jonathan S. ...
58
Voted
SCN
2010
Springer
14 years 4 months ago
On predictive routing of security contexts in an all-IP network
Hahnsang Kim, Kang G. Shin
WOWMOM
1999
ACM
153views Multimedia» more  WOWMOM 1999»
15 years 2 months ago
Mobility Support Using SIP
Enabling mobility in IP networks is an important issue for making use of the many light-weight devices appearing at the market. The IP mobility support being standardized in the I...
Elin Wedlund, Henning Schulzrinne
CCS
2009
ACM
15 years 10 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
ICC
2011
IEEE
269views Communications» more  ICC 2011»
13 years 9 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino