نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :Wireless Communications and Mobile Computing 2005
Seung-Seok Kang Matt W. Mutka

This paper provides a scheme to reduce the cost to distribute multimedia content to a set of nearby mobile peers, which we call chums. One peer, called the proxy, downloads multimedia content via a telecommunication link, and distributes it (which we call chumcast) to the ad hoc network formed from the set of nearby peers. Each peer in the ad hoc network takes turns serving as a proxy. Every pe...

2000
Herbert Leitold

Telecommunication increasingly influences the way we live, work, and socialize. Buzzword such as the Internet or broadband networking are omnipresent—so are reports of security breaches. Consequently, security services are indispensable to applications as divers as electronic commerce, linking company networks, telemedicine, and so forth. Whereas application built-in security is widely spread, ...

2010
Vladimir S. Zaborovsky Vladimir Mulukha Sergey Kouprienko Oleg Zayats

We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi-core implementation. Proposed randomized push-out buffer management mechanism with α parameter allows tuning very efficiently the loss probability of priority packets and the time they spend in queue as the factors u...

Journal: :RFC 2012
Eliot Lear Hannes Tschofenig Henry Mauldin Simon Josefsson

OpenID has found its usage on the Internet for Web Single Sign-On. Simple Authentication and Security Layer (SASL) and the Generic Security Service Application Program Interface (GSS-API) are application frameworks to generalize authentication. This memo specifies a SASL and GSS-API mechanism for OpenID that allows the integration of existing OpenID Identity Providers with applications using SA...

2006
Győző Gódor

Nowadays in the field of telecommunications and computer sciences the most important part of development is security. In UMTS, the weaknesses of GSM solved but some problems in the security area are revealed, e.g. the IMSI is plain on the air interface. We introduce our novel authentication algorithm which solves this fault. The GSZV algorithm is based on public key infrastructure which is used...

2014
Wei Ning Haibo Wang Wei Wang

The fifth generation of WiFi and new standards of telecommunication protocols enable the implementation of Mobile ad hoc network in retail business at a lower cost. While the retail industry begins to embrace this new technology and install a WiFi hotspot in their stores and shopping carts, the issues of security become highly challenging to both public and private organizations. This paper wil...

Journal: :CoRR 2015
Kerim Goztepe

—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of a...

2009
Thomas Brandstetter Konstantin Knorr Ute Rosenbaum

Protecting our critical infrastructures like energy generation and distribution, telecommunication, production and traffic against cyber attacks is one of the major challenges of the new millennium. However, as security is such a complex and multilayer topic often the necessary structured foundation is missing for a manufacturer to assess the current security level of a system. This paper intro...

2000
A. Alireza U. Lang M. Schumacher

Large, distributed applications play an increasingly central role in today’s IT environment. The diversity and openness of these systems have given rise to questions of trust and security. It is the aim of the project Secure TINA to examine exactly these questions and try to find possible solutions. The focus lies on OMG’s Common Object Request Broker Architecture (CORBA) as a basis technology ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید