Sciweavers

7300 search results - page 1368 / 1460
» Multi-modal network protocols
Sort
View
ESORICS
2007
Springer
15 years 11 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
15 years 11 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
128
Voted
HUC
2007
Springer
15 years 11 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
POLICY
2007
Springer
15 years 11 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
135
Voted
SSS
2007
Springer
15 years 11 months ago
The Truth System: Can a System of Lying Processes Stabilize?
We introduce a new abstract system, called the truth system. In the truth system, a process deduces a true value, with high probability, from an incoming stream of both true and fa...
Mohamed G. Gouda, Yan Li
« Prev « First page 1368 / 1460 Last » Next »