Sciweavers

6844 search results - page 1049 / 1369
» Web Service Security
Sort
View
128
Voted
ICICS
1997
Springer
15 years 9 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
APNOMS
2006
Springer
15 years 8 months ago
An Architectural Framework for Network Convergence Through Application Level Presence Signaling
Over the past few years we have witnessed steady progress toward convergence in communications. We believe we are now witnessing nce beyond just media transport. Further, abstract ...
Atanu Mukherjee
LISA
2001
15 years 6 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
ULPAA
1994
120views Hardware» more  ULPAA 1994»
15 years 6 months ago
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
A uniform extension language for email systems can radically extend the utility of electronic mail, simplifying the construction of mail-based services and permitting the delivery...
Nathaniel S. Borenstein
106
Voted
JSS
2006
65views more  JSS 2006»
15 years 5 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
« Prev « First page 1049 / 1369 Last » Next »