Sciweavers

50 search results - page 8 / 10
» aina 2004
Sort
View
AINA
2004
IEEE
13 years 9 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
AINA
2004
IEEE
13 years 9 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
AINA
2004
IEEE
13 years 9 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
AINA
2004
IEEE
13 years 9 months ago
Rich Metadata Searches Using the JXTA Content Manager Service
With the development of networking technologies and the advent of the peer-to-peer computing paradigm, distributed file-sharing systems like Gnutella are becoming prevalent over t...
Xin Xiang, Yuanchun Shi, Ling Guo
AINA
2004
IEEE
13 years 9 months ago
Can Streaming Of Stored Playback Video Be Supported On Peer to Peer Infrastructure?
Streaming live video over peers in the Internet is gaining popularity since it has the advantage of reducing the load on the server and enable the server to perform other speciali...
K. Kalapriya, S. K. Nandy, K. Venkatesh Babu