Sciweavers

972 search results - page 66 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
88
Voted
CRYPTOLOGIA
2006
67views more  CRYPTOLOGIA 2006»
15 years 19 days ago
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition ...
Joshua Holden, Richard Layton, Laurence D. Merkle,...
90
Voted
WWW
2009
ACM
16 years 1 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
WMASH
2004
ACM
15 years 6 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
LCN
2002
IEEE
15 years 5 months ago
Global Mobile IPv6 Addressing Using Transition Mechanisms
The adoption of the IPv4 protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global Internet. The pressure for more IP...
Edgard Jamhour, Simone Storoz
IMC
2007
ACM
15 years 2 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...