Sciweavers

FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 8 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
141
Voted
EICS
2010
ACM
15 years 8 months ago
WebWOZ: a wizard of oz prototyping framework
Language Technology (LT) based applications become more popular as technology improves. Prototyping early in the design process is critical for the development of high quality app...
Stephan Schlögl, Gavin Doherty, Nikiforos Kar...
EENERGY
2010
15 years 8 months ago
Energy-efficient cluster computing with FAWN: workloads and implications
Vijay Vasudevan, David G. Andersen, Michael Kamins...
EENERGY
2010
15 years 8 months ago
ICT for green: how computers can help us to conserve energy
Information and communication technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance o...
Friedemann Mattern, Thorsten Staake, Markus Weiss
EENERGY
2010
15 years 8 months ago
Greening the internet with content-centric networking
Our energy efficiency analysis of various content dissemination strategies reveals that a change in network architecture from host-oriented to content-centric networking (CCN) can...
Uichin Lee, Ivica Rimac, Volker Hilt