Sciweavers

5324 search results - page 691 / 1065
» Internet Security Protocols
Sort
View
NETWORK
2008
100views more  NETWORK 2008»
15 years 5 months ago
Distributed connectivity service for a SIP infrastructure
Because of the constant reduction of available public network addresses and the necessity to secure networks, devices like Network Address Translators and firewalls have become qui...
Luigi Ciminiera, Guido Marchetto, Fulvio Risso, Li...
161
Voted
IJSN
2010
148views more  IJSN 2010»
15 years 3 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
120
Voted
JPDC
2011
131views more  JPDC 2011»
15 years 17 hour ago
Conditional e-payments with transferability
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are ...
Bogdan Carbunar, Weidong Shi, Radu Sion
141
Voted
PODC
2011
ACM
14 years 8 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi
PADL
2012
Springer
14 years 19 days ago
Recent Advances in Declarative Networking
Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a d...
Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao,...