Sciweavers

9503 search results - page 30 / 1901
» Authenticated System Calls
Sort
View
WPES
2004
ACM
15 years 9 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 10 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
WSC
2008
15 years 6 months ago
Enhanced Bandwidth-Delay Based Routing Algorithm for a packet-switched virtual call centre environment
Traditionally call centres were based on circuit-switched systems. But with the advancement of communication technologies, call centres have shifted to packet-switched systems. Th...
Akinbola Adetunji, Hadi Larijani
JLP
2008
134views more  JLP 2008»
15 years 4 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu
SIGOPSE
1992
ACM
15 years 8 months ago
An experimental comparison of remote procedure call and group communication
This paper suggests that a distributed system should support two communication paradigms: Remote Procedure Call (RPC) and group commumcation. The former is used for point-to-point...
M. Frans Kaashoek, Andrew S. Tanenbaum, Kees Verst...