Sciweavers

76 search results - page 15 / 16
» Deniable Internet Key Exchange
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
13 years 10 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
DRM
2003
Springer
13 years 10 months ago
The IP war: apocalypse or revolution?
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultim...
Tsvi Gal, Howard M. Singer, Laird Popkin
ICDE
2002
IEEE
181views Database» more  ICDE 2002»
13 years 10 months ago
YFilter: Efficient and Scalable Filtering of XML Documents
Soon, much of the data exchanged over the Internet will be encoded in XML, allowing for sophisticated filtering and content-based routing. We have built a filtering engine called ...
Yanlei Diao, Peter M. Fischer, Michael J. Franklin...
MOBISYS
2010
ACM
13 years 7 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
VIIP
2001
13 years 6 months ago
3-D Haar Wavelet Transformation and Texture-based 3-D Reconstruction of Biomedical Data Sets
Enhanced biomedical image scanning technology and growing network accessibility have created a need for faster and more efficient data exchange over the Internet and in closed net...
Pujita Pinnamaneni, Sagar Saladi, Joerg Meyer