Sciweavers

1256 search results - page 52 / 252
» A Simple E-Voting Protocol
Sort
View
103
Voted
BROADNETS
2006
IEEE
15 years 7 months ago
XIOPerf: A Tool for Evaluating Network Protocols
— The nature of Grid and distributed computing implies communication between heterogeneous systems over a wide and ever-changing variety of network environments. Often large amou...
John Bresnahan, Rajkumar Kettimuthu, Ian T. Foster
136
Voted
MOBICOM
2005
ACM
15 years 6 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
115
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani
ICNP
1999
IEEE
15 years 5 months ago
Policy Disputes in Path-Vector Protocols
The Border Gateway Protocol, BGP, is currently the only interdomain routing protocol employed on the Internet. As required of any interdomain protocol, BGP allows policy-based met...
Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilf...