Sciweavers

1129 search results - page 158 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
EUROPKI
2007
Springer
15 years 4 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
TRUSTBUS
2010
Springer
14 years 7 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
SIGOPSE
2004
ACM
15 years 3 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 2 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman