Sciweavers

4820 search results - page 396 / 964
» Implementing Signatures for C
Sort
View
SASN
2003
ACM
15 years 10 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
GPCE
2003
Springer
15 years 10 months ago
Spidle: A DSL Approach to Specifying Streaming Applications
Multimedia stream processing is a rapidly evolving domain which requires much software development and expects high performance. Developing a streaming application often involves l...
Charles Consel, Hédi Hamdi, Laurent R&eacut...
127
Voted
ACSAC
2002
IEEE
15 years 9 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
CLUSTER
2002
IEEE
15 years 9 months ago
Shell over a Cluster (SHOC): Towards Achieving Single System Image via the Shell
With dramatic improvements in cost-performance, the use of clusters of personal computers is fast becoming widespread. For ease of use and management, a Single System Image (SSI) ...
C. M. Tan, C. P. Tan, Weng-Fai Wong
COMPSAC
2002
IEEE
15 years 9 months ago
Rights Protection for Digital Contents Redistribution Over the Internet
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
Shing-Chi Cheung, Hanif Curreem