Sciweavers

2454 search results - page 210 / 491
» Privacy in the Information and Communications Technologies
Sort
View
122
Voted
ISAS
2005
Springer
15 years 7 months ago
Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability
— The Session Initiation Protocol (SIP) has emerged as the preferred Internet telephony signaling protocol for communications networks. In this capacity, it becomes increasingly ...
Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mend...
CAISE
2004
Springer
15 years 7 months ago
Ontologies in the CRP Henri Tudor Projects
The Centre de Recherche Public Henri Tudor is as a public research centre whose main objective is to promote innovation in both private and public sectors. The purpose of this post...
Jean-Sébastien Brunner, Thibaud Latour
IAW
2003
IEEE
15 years 7 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
CCS
2006
ACM
15 years 5 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ISW
2000
Springer
15 years 5 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou