Recherche
Voici les éléments 1-9 de 9
VIPSec defined
(2008)
Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...
Enhancing WPS security
(2012)
The main concern on the use of wireless technologies is security, due to the nature of the medium. User awareness in order to implement efficient security configurations is an important requirement raised by the technology, ...
A secure VoIP conference system: Architecture analysis and design issues
(2007)
In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation ...
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)
Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...
Voice interactive personalized security protocol: Definition and security analysis
(2007)
Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...
Mailbook: A social network against spamming
(2011)
Spam is the main problem of email systems nowadays. The total amount of spam emails account for more than 75% of the total emails exchanged worldwide; recent reports raise this number up to more than 90%. Novel anti-spam ...
An architecture for secure VoiIP and collaboration applications
(2007)
VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ...
Design and implementation of a VIPSec based application
(2007)
Voice over IP (VoIP) is one of the most emerging technologies, while a respectable number of corresponding applications are being implemented or updated in daily basis. Although communications security is a constant ...
Simple Mail Delivery Protocol: Recipient-based email delivery with anti-spam support
(2013)
In this paper we propose a user based architecture for the email system, where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the ...