Sciweavers

4305 search results - page 593 / 861
» Analysing Protocol Implementations
Sort
View
INDOCRYPT
2001
Springer
15 years 9 months ago
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem[1]. In the previous schemes[2]-[4] the enciphering rate is so small that it seems very difficu...
Minoru Kuribayashi, Hatsukazu Tanaka
VLDB
2001
ACM
96views Database» more  VLDB 2001»
15 years 9 months ago
Architectures for Internal Web Services Deployment
There is a new emerging world of web services. In this world, services will be combined in innovative ways to form elaborate services out of building blocks of other services. Thi...
Oded Shmueli
ICDCS
2000
IEEE
15 years 9 months ago
On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System
Several studies in network traffic characterization have concluded that network traffic is self-similar and therefore not readily amenable to statistical multiplexing in a distr...
Peerapol Tinnakornsrisuphap, Wu-chun Feng, Ian R. ...
MSE
2000
IEEE
165views Hardware» more  MSE 2000»
15 years 9 months ago
JACIE - an Authoring Language for Rapid Prototyping Net-Centric, Multimedia and Collaborative Applications
With continuous acceptance of World Wide Web (WWW) as a de facto standard for human-computer interaction and human-human communication, it is desirable to develop net-centric, mul...
Abdul S. Haji-Ismail, Min Chen, Phil W. Grant, Mar...
NDSS
2000
IEEE
15 years 9 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...