Learn More
In addition to preventive mechanisms intrusion detection systems (IDS) are an important instrument to protect computer systems. Most IDSs used today realize the misuse detection approach. These systems analyze monitored events for occurrences of defined patterns (signatures), which indicate security violations. Up to now only little attention has been paid(More)
SIP (Session Initiation Protocol) is becoming the mostly deployed signaling protocol for VoIP (Voice over IP). Security is of utmost importance for its usage due to the open architecture of the Internet. Recently, Yoon et al. proposed a SIP authentication scheme based on elliptic curve cryptography (ECC) that claimed to provide higher security than other(More)
In this paper, we introduce the multiparty videoconferencing system G CSVA (Group Communication and Scalability in Videoconferencing over ATM). It has been designed for the support of collaborative applications. The main features of G CSVA are: a strong floor control organization, dynamic scalability of video streams according to the number and the(More)
Implementations automatically derived from SDL descriptions often do not fulfill the performance requirements of performance-sensitive applications. In the paper, we describe how three different techniques mainly known from the manual implementation of protocol architectures can be applied to automatically derive efficient implementations from SDL(More)