Sciweavers

1709 search results - page 20 / 342
» An active network approach to virtual private networks
Sort
View
150
Voted
PERCOM
2009
ACM
15 years 8 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
CRITIS
2007
15 years 3 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
VRST
1999
ACM
15 years 6 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven
MOBIHOC
2005
ACM
16 years 1 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
91
Voted
CCR
2006
101views more  CCR 2006»
15 years 1 months ago
Reflections on network architecture: an active networking perspective
After a long period when networking research seemed to be focused mainly on making the existing Internet work better, interest in "clean slate" approaches to network arc...
Kenneth L. Calvert