Sciweavers

7300 search results - page 1443 / 1460
» Multi-modal network protocols
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
ANSS
2005
IEEE
15 years 5 months ago
Perfect Simulations for Random Trip Mobility Models
The random trip model was recently proposed as a generic mobility model that contains many particular mobility models, including the widely-known random waypoint and random walks,...
Santashil PalChaudhuri, Jean-Yves Le Boudec, Milan...
CCGRID
2005
IEEE
15 years 5 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
MM
2005
ACM
103views Multimedia» more  MM 2005»
15 years 5 months ago
Simulated virtual market place by using voiscape communication medium
We are developing a new voice communication medium called voiscape. Voiscape enables natural and seamless bi-directional voice communication by using sound to create a virtual sou...
Yasusi Kanada
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
« Prev « First page 1443 / 1460 Last » Next »