Sciweavers

5665 search results - page 334 / 1133
» Introduction to Computer Security
Sort
View
127
Voted
CCECE
2006
IEEE
15 years 8 months ago
Security Issues in VOIP Applications
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve se...
Patrick C. K. Hung, Miguel Vargas Martin
STORAGESS
2005
ACM
15 years 8 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
EDO
2005
Springer
15 years 8 months ago
Secure event types in content-based, multi-domain publish/subscribe systems
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published ...
Lauri I. W. Pesonen, Jean Bacon
ICCSA
2005
Springer
15 years 8 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
ACSAC
2003
IEEE
15 years 7 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman