Sciweavers

207 search results - page 24 / 42
» Automated Protocol Implementations Based on Activity Threads
Sort
View
ISADS
1999
IEEE
15 years 7 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
154
Voted
JIPS
2007
223views more  JIPS 2007»
15 years 2 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
124
Voted
ICCCN
1998
IEEE
15 years 7 months ago
HYDRANET : Network Support for Scaling of Large-Scale Services
With the explosive growth of demand for services on the Internet, the networking infrastructure (routers, protocols, servers) is under considerable stress. Mechanisms are needed f...
Hamesh Chawla, Geoff Dillon, Riccardo Bettati
128
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets
138
Voted
IMC
2010
ACM
15 years 19 days ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...