Sciweavers

265 search results - page 48 / 53
» Security Patterns for Voice over IP Networks
Sort
View
MAM
2007
143views more  MAM 2007»
14 years 9 months ago
A distributed admission control system for MANET environments supporting multipath routing protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, José Oliver...
CSFW
2007
IEEE
15 years 3 months ago
Secure Implementations for Typed Session Abstractions
mplementations for Typed Session Abstractions Ricardo Corin1,2,3 Pierre-Malo Deni´elou1,2 C´edric Fournet1,2 Karthikeyan Bhargavan1,2 James Leifer1 1 MSR-INRIA Joint Centre 2 Mic...
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
CN
2002
161views more  CN 2002»
14 years 9 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
76
Voted
SIGMETRICS
2008
ACM
143views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Pictures from the Skype
This demo focuses on the online characterization and classification of Skype traffic, a very popular and fashionable VoIP application nowadays. Building over previous work on the ...
Dario Rossi, Silvio Valenti, Paolo Veglia, Dario B...
74
Voted
FSTTCS
2003
Springer
15 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh