Sciweavers

59 search results - page 11 / 12
» Cross - Border Public Services: Analysis and Modeling
Sort
View
INFOCOM
2005
IEEE
13 years 11 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
IPM
2002
86views more  IPM 2002»
13 years 5 months ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
ITCC
2005
IEEE
13 years 11 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
JUCS
2008
113views more  JUCS 2008»
13 years 5 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
CCS
2011
ACM
12 years 5 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...