Sciweavers

5324 search results - page 685 / 1065
» Internet Security Protocols
Sort
View
STORAGESS
2006
ACM
15 years 11 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
CQRE
1999
Springer
15 years 9 months ago
Electronic Payments: Where Do We Go from Here?
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potentia...
Markus Jakobsson, David M'Raïhi, Yiannis Tsio...
PERCOM
2004
ACM
16 years 4 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
ICC
2007
IEEE
15 years 11 months ago
Measurement and Evaluation of ENUM Server Performance
Abstract—ENUM is a DNS-based protocol standard for mapping E.164 telephone numbers to Internet Uniform Resource Identifiers (URIs). It places unique requirements on the existing...
Charles Shen, Henning Schulzrinne
112
Voted
AICT
2006
IEEE
15 years 11 months ago
Networks without Borders: Communication despite Disconnection
Communication in the face of intermittent, short-lived and unreliable connectivity can be difficult when relying solely on Internet protocols which have an implicit assumption of...
Gregory Kempe, Norman C. Hutchinson