Sciweavers

2108 search results - page 208 / 422
» Encrypted
Sort
View
115
Voted
USITS
2003
15 years 5 months ago
TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-end Network Services
straction. TESLA services can be deployed transparently using dynamic library interposition and can be composed by chaining event handlers in a graph structure. We show how TESLA c...
Jon Salz, Hari Balakrishnan, Alex C. Snoeren
129
Voted
CORR
2008
Springer
81views Education» more  CORR 2008»
15 years 4 months ago
A New Type of Cipher: DICING_csb
: In this paper, we will propose a new type of cipher named DICING_CSB, which come from our previous a synchronous stream cipher DICING. It applies a stream of subkeys and a encryp...
Li an-Ping
IAJIT
2008
179views more  IAJIT 2008»
15 years 4 months ago
Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers
: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption sc...
Ragheb Toemeh, Subbanagounder Arumugam
CN
2006
101views more  CN 2006»
15 years 4 months ago
The FastTrack overlay: A measurement study
Both in terms of number of participating users and in traffic volume, FastTrack is one of the most important applications in the Internet today. Nevertheless, because FastTrack is...
Jian Liang, Rakesh Kumar, Keith W. Ross
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 3 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau