Results 21 to 30 of about 53,786 (213)
NAT Traversing Solutions for SIP Applications
Session Initiation Protocol (SIP) has been proposed for multimedia services and wide-area connectivity in smart home environments (SHEs). An important issue for SIP deployment in SHEs is network address translator (NAT) traversing.
Huang Ya-Lin +2 more
doaj +2 more sources
Developing an Evaluation Model to Measure the Intelligence Level of Smart Industrial Parks
The intelligent development of smart industrial parks (SIPs) can not only promote the development of smart cities, but also promote the development of intelligent large-scale buildings.
Ailing Wang +5 more
doaj +1 more source
A new security architecture for SIP based P2P computer networks [PDF]
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core +2 more sources
BackgroundThe National Cancer Institute Informatics Technology for Cancer Research (ITCR) program provides a series of funding mechanisms to create an ecosystem of open-source software (OSS) that serves the needs of cancer ...
Ye Ye +21 more
doaj +1 more source
Towards Securing Peer-to-peer SIP in the MANET Context: Existing Work and Perspectives [PDF]
The Session Initiation Protocol (SIP) is a key building block of many social applications, including VoIP communication and instant messaging. In its original architecture, SIP heavily relies on servers such as proxies and registrars.
Cormier, Alexandre +4 more
core +1 more source
Integrating Usage Control with SIP-Based Communications
The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended
E. Barka, A. Lakas
doaj +1 more source
Performance Evaluation of RSA Variants For Network Security Using SIP [PDF]
Networks and especially network security, have recently become an area of essential concern in data communication due to the ever-present need for data security. Especially that data is to be exposed to the public and traveled from one network to another.
Maan Alfathi, Ali AL-ALLAWEE
doaj +1 more source
Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks.
Waleed Nazih +4 more
doaj +1 more source
XMPP and iDTV or how to make television a social medium [PDF]
Instant Messaging (IM) has the potential to become one of the killer applications for interactive Digital Television (iDTV) [12]. However, several factors make it difficult to provide a good implementation of IM services, among which the limited ...
Deryckere, Tom +3 more
core +1 more source
MAGDA: A Mobile Agent based Grid Architecture [PDF]
Mobile agents mean both a technology and a programming paradigm. They allow for a flexible approach which can alleviate a number of issues present in distributed and Grid-based systems, by means of features such as migration, cloning, messaging and other
B. DI MARTINO +3 more
core +1 more source

