Real-time, online multi-player games are becoming increasingly popular due to advances in game design and the proliferation of broadband Internet access. However, fairness remains...
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Conventional wisdom has been that the performance limitations in the current Internet lie at the edges of the network – i.e last mile connectivity to users, or access links of s...
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
The way conventional Ethernet is used today differs in two aspects from how dedicated system area networks are used. Firstly, dedicated system area networks are lossless and only d...