Response Code

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 80139 Experts worldwide ranked by ideXlab platform

Henning Schulzrinne - One of the best experts on this subject based on the ideXlab platform.

  • A SIP Response Code for Unwanted Calls
    2017
    Co-Authors: Henning Schulzrinne
    Abstract:

    This document defines the 607 (Unwanted) SIP Response Code, allowing called parties to indicate that the call or message was unwanted. SIP entities may use this information to adjust how future calls from this calling party are handled for the called party or more broadly.

  • session initiation protocol sip overload control
    RFC, 2014
    Co-Authors: Vijay K Gurbani, Volker Hilt, Henning Schulzrinne
    Abstract:

    Overload occurs in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all the SIP messages they receive. Even though the SIP protocol provides a limited overload control mechanism through its 503 (Service Unavailable) Response Code, SIP servers are still vulnerable to overload. This document defines the behavior of SIP servers involved in overload control and also specifies a loss-based overload scheme for SIP.

V. Kavitha - One of the best experts on this subject based on the ideXlab platform.

  • Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Cluster Computing, 2017
    Co-Authors: K. L. Neela, V. Kavitha
    Abstract:

    Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate /IT sectors were facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick Response Code and hash-based timestamp so that the real-time attacks are stopped or prevented.

Christer Holmberg - One of the best experts on this subject based on the ideXlab platform.

Volker Hilt - One of the best experts on this subject based on the ideXlab platform.

  • session initiation protocol sip overload control
    RFC, 2014
    Co-Authors: Vijay K Gurbani, Volker Hilt, Henning Schulzrinne
    Abstract:

    Overload occurs in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all the SIP messages they receive. Even though the SIP protocol provides a limited overload control mechanism through its 503 (Service Unavailable) Response Code, SIP servers are still vulnerable to overload. This document defines the behavior of SIP servers involved in overload control and also specifies a loss-based overload scheme for SIP.

  • design considerations for session initiation protocol sip overload control
    RFC, 2011
    Co-Authors: Volker Hilt, Eric Noel, Charles Shen, Ahmed Abdelal
    Abstract:

    Overload occurs in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all SIP messages they receive. Even though the SIP protocol provides a limited overload control mechanism through its 503 (Service Unavailable) Response Code, SIP servers are still vulnerable to overload. This document discusses models and design considerations for a SIP overload control mechanism.

Ailing Tian - One of the best experts on this subject based on the ideXlab platform.

  • optical noise free image encryption based on quick Response Code and high dimension chaotic system in gyrator transform domain
    Optics and Lasers in Engineering, 2017
    Co-Authors: Minjie Xu, Ailing Tian
    Abstract:

    Abstract A novel optical image encryption scheme is proposed based on quick Response Code and high dimension chaotic system, where only the intensity distribution of enCoded information is recorded as ciphertext. Initially, the quick Response Code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the Code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick Response Code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted Code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.

  • Optical noise-free image encryption based on quick Response Code and high dimension chaotic system in gyrator transform domain
    Optics and Lasers in Engineering, 2017
    Co-Authors: Liansheng Sui, Ailing Tian
    Abstract:

    Abstract A novel optical image encryption scheme is proposed based on quick Response Code and high dimension chaotic system, where only the intensity distribution of enCoded information is recorded as ciphertext. Initially, the quick Response Code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the Code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick Response Code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted Code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.