Sciweavers

212 search results - page 39 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
INFOCOM
2010
IEEE
14 years 7 months ago
Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming Systems
—The P2P pull-push hybrid architecture has achieved great success in delivering live video traffic over the Internet. However, a formal study on the sub-stream scheduling proble...
Zhenjiang Li, Danny H. K. Tsang, Wang-Chien Lee
ICDCS
2008
IEEE
15 years 3 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
85
Voted
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
JSAC
2007
132views more  JSAC 2007»
14 years 9 months ago
Lifetime maximization via cooperative nodes and relay deployment in wireless networks
— Extending lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributed nodes in wireless networks. Cooperative co...
Thanongsak Himsoon, W. Pam Siriwongpairat, Zhu Han...
99
Voted
SIGECOM
2006
ACM
385views ECommerce» more  SIGECOM 2006»
15 years 3 months ago
B2C e-commerce development in Africa: case study of Botswana
The global wave of ICT development has become a strong driving force in almost every aspect of human endeavor. Electronic commerce (e-commerce) is fast gaining a prominent place i...
Faith-Michael E. Uzoka, Geoffrey G. Seleka