Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Christian Schanes"'
Publikováno v:
2022 IEEE Security and Privacy Workshops (SPW).
Publikováno v:
International Journal for Information Security Research. 1:53-60
Voice over IP (VoIP) is in wide use today, replacing phone lines in many scenarios. However, often, security isn’t considered well enough, even though many security attacks are already known. More research on VoIP security is needed to enhance the
Autor:
Christof Kier, Gerald Madlmayr, Michael Schafferer, Alexander Nawratil, Thomas Grechenig, Christian Schanes
Publikováno v:
IMF
As payment cards and mobile devices are equipped with Near Field Communication (NFC) technology, electronic paymenttransactions at physical Point of Sale (POS) environments are changing. Payment transactions do not require the customerto insert their
Autor:
Christian Schanes, Florian Fankhauser, Erwin P. Rathgeb, Thomas Grechenig, Adnan Aziz, Dirk Hoffstadt, Markus Gruber
Publikováno v:
Networking
Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g
Publikováno v:
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.
Publikováno v:
2014 IEEE Fifth International Conference on Communications and Electronics (ICCE).
Publikováno v:
2014 IEEE 5th International Conference on Software Engineering and Service Science.
Data retention is a controversial instrument of governments and their agencies with the background of fighting terrorism and crime. In 2006 the European Union (EU) passed the directive 2006/24/EC, which is about the retention of data generated or pro
Publikováno v:
PST
The number of Voice over IP systems and the number of Session Initiation Protocol users is constantly increasing. The new Voice over IP infrastructures are connected with the traditional Public Switched Telephone Network and attacks against the phone
Publikováno v:
ICST Workshops
The increasing complexity of software and IT systems creates the necessity for research on technologies addressing current key security challenges. To meet security requirements in IT infrastructures, a security engineering process has to be establis
Publikováno v:
Security and Privacy Protection in Information Processing Systems ISBN: 9783642392177
SEC
IFIP Advances in Information and Communication Technology
28th Security and Privacy Protection in Information Processing Systems (SEC)
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.111-124, ⟨10.1007/978-3-642-39218-4_9⟩
SEC
IFIP Advances in Information and Communication Technology
28th Security and Privacy Protection in Information Processing Systems (SEC)
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.111-124, ⟨10.1007/978-3-642-39218-4_9⟩
Part 3: Network Security/ Cryptography; International audience; The complexity of IT systems and the criticality of robust IT systems is constantly increasing. Testing a system requires consideration of different protocols and interfaces, which makes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::07f3d7f7c2a8048ff0594d401a5ad7c1
https://doi.org/10.1007/978-3-642-39218-4_9
https://doi.org/10.1007/978-3-642-39218-4_9