Results 41 to 50 of about 53,786 (213)

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Usage control in SIP-based multimedia delivery [PDF]

open access: yes, 2013
The Session Initiation Protocol (SIP) is an application layer signaling protocol for the creation, modification and termination of multimedia sessions and VoIP calls with one or more participants.SIP is widely accepted as the protocol that will dominate ...
Karopoulos, Georgios   +2 more
core   +1 more source

Animal‐Based Brands Taking the Plant‐Based Opportunity: A Tasting Experiment Exploring Consumer Acceptance of Plant‐Based Brand Extensions

open access: yesAgribusiness, EarlyView.
ABSTRACT This study investigates how consumer taste and brand equity perceptions shape the acceptance of plant‐based milk products. Using a blind/informed tasting experiment, we evaluated consumers' willingness to buy (WTB) and taste perception of a plant‐based milk alternative produced by a traditional dairy brand, compared with competing plant‐based ...
Federico Parmiggiani   +6 more
wiley   +1 more source

Security testing of SIP implementations

open access: yes, 2003
The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia conferencing and instant messaging. Although SIP implementations have not yet been widely deployed, the product portfolio is expanding rapidly. We describe a method to assess the robustness of SIP implementation by describing a tool to find vulnerabilities.
Wieser, Christian   +2 more
openaire   +2 more sources

Proposed Model for SIP Security Enhancement

open access: yesCommunications and Network, 2010
This paper aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized.
Munir B. Sayyad   +2 more
openaire   +2 more sources

Healthy Snacks Elaborated With Decoction Residues of Hibiscus sabdariffa L: Physical and Sensory Characteristics

open access: yesFood Chemistry International, EarlyView.
Healthy snacks formulated with food by‐products are gaining interest within the food industry. Decoction residues of Hibiscus sabdariffa (roselle) retain thermostable polyphenols. Extruded snacks enriched with roselle showed a reduction in the expansion index as the roselle concentration increased.
Monserrat Hernández‐Bautista   +3 more
wiley   +1 more source

Intrusion detection mechanisms for VoIP applications [PDF]

open access: yes, 2006
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier   +2 more
core   +3 more sources

Influence of Nanomaterials and Nanocomposites on the Nutrient Composition

open access: yesFood Safety and Health, EarlyView.
Nanomaterials and nanocomposites enhance crop nutrition and food quality by improving nutrient availability, plant uptake, and bioavailability through controlled delivery and nano‐encapsulation. Their applications in agriculture and food systems enable sustainable biofortification, improved preservation, and functional foods, while emphasizing safety ...
Akanksha Dwivedi   +4 more
wiley   +1 more source

Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

open access: yesIEEE Access, 2023
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities.
Setiyo Budiyanto, Dadang Gunawan
doaj   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy