Sciweavers

828 search results - page 102 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
NSPW
2003
ACM
15 years 8 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CCS
2007
ACM
15 years 9 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
IPPS
2003
IEEE
15 years 8 months ago
Anonymous Publish/Subscribe in P2P Networks
One of the most important issues to deal with in peerto-peer networks is how to disseminate information. In this paper, we use a completely new approach to solving the information...
Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal,...
COMPLEX
2009
Springer
15 years 9 months ago
Retail Location Choice with Complementary Goods: An Agent-Based Model
This paper examines the emergence of retail clusters on a supply chain network comprised of suppliers, retailers, and consumers. An agent-based model is proposed to investigate ret...
Arthur Huang, David Levinson
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 2 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...