Sciweavers

1513 search results - page 94 / 303
» Fibonacci Correction Networks
Sort
View
ESORICS
2000
Springer
15 years 8 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
170
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
Windowed Certificate Revocation
Abstract--The advent of electronic commerce and personal communications on the Internet heightens concerns over the lack of privacy and security. Network services providing a wide ...
Patrick Drew McDaniel, Sugih Jamin
CONEXT
2008
ACM
15 years 6 months ago
Supporting delay-intolerant applications
Reliable transport protocols that offer low per-packet delays are becoming increasingly important, particularly for critical infrastructure services. Forward error correction (FEC...
Shufeng Huang
RIVF
2003
15 years 6 months ago
MAF: Un Protocole de Multicast Fiable
— This paper describes the design and implementation of a novel reliable multicast protocol, totally reliable and scalable to large number of receivers. MAF relies on Active Netw...
Prométhée Spathis, Kim Loan Thai
CONCURRENCY
2008
80views more  CONCURRENCY 2008»
15 years 5 months ago
Robust incentives via multi-level Tit-for-Tat
Much work has been done to address the need for incentive models in real deployed peer-to-peer networks. In this paper, we discuss problems found with the incentive model in a lar...
Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei D...