Sciweavers

4305 search results - page 637 / 861
» Analysing Protocol Implementations
Sort
View
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
COOPIS
2002
IEEE
15 years 9 months ago
An Adaptive Scheduling Service for Real-Time CORBA
CORBA is an important standard middleware used in the development of distributed applications. It has also been used with distributed real-time applications, through its extension ...
Alexandre Cervieri, Rômulo Silva de Oliveira...
DANCE
2002
IEEE
15 years 9 months ago
Design and Evaluation of a High Performance Dynamically Extensible Router
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...
DANCE
2002
IEEE
15 years 9 months ago
SANDS: Specialized Active Networking for Distributed Simulation
This paper provides an overview of SANDS (Specialized Active Networking for Distributed Simulation), a DARPA-ITO sponsored research project that is using active networking to deve...
Steve Zabele, M. Dorsch, Zihui Ge, Ping Ji, Mark K...
DEXAW
2002
IEEE
80views Database» more  DEXAW 2002»
15 years 9 months ago
Private Auctions with Multiple Rounds and Multiple Items
For selling spectrum licenses economists have designed new auction types proceeding over several rounds and offering several licenses simultaneously. Communication between bidders...
Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Stei...