Sciweavers

849 search results - page 49 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
128
Voted
JCIT
2010
197views more  JCIT 2010»
14 years 7 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
135
Voted
TMC
2002
147views more  TMC 2002»
15 years 4 days ago
Energy-Aware Wireless Networking with Directional Antennas: The Case of Session-Based Broadcasting and Multicasting
We consider ad hoc wireless networks that use directional antennas and have limited energy resources. To explore quantitatively the advantage offered by the use of directional ante...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
108
Voted
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 4 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
141
Voted
CSFW
1999
IEEE
15 years 4 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
82
Voted
AAAI
2008
15 years 2 months ago
Personalisation of Telecommunications Services as Combinatorial Optimisation
Modern feature-rich telecommunications services offer significant opportunities to human users. To make these services more usable, facilitating personalisation is very important....
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...