Sciweavers

7329 search results - page 1409 / 1466
» Network Extractor Protocols
Sort
View
108
Voted
JAMIA
2010
76views more  JAMIA 2010»
14 years 10 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
TELSYS
2010
154views more  TELSYS 2010»
14 years 10 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
128
Voted
TWC
2010
14 years 10 months ago
Cellular Systems with Non-Regenerative Relaying and Cooperative Base Stations
In this paper, the performance of cellular networks with joint multicell processing and dedicated relay terminals is investigated. It is assumed that each relay terminal is capable...
Oren Somekh, Osvaldo Simeone, Harold Vincent Poor,...
IJISEC
2011
71views more  IJISEC 2011»
14 years 6 months ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
142
Voted
WWW
2003
ACM
16 years 4 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
« Prev « First page 1409 / 1466 Last » Next »