Sciweavers

7329 search results - page 1226 / 1466
» Network Extractor Protocols
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
INFOCOM
2002
IEEE
15 years 9 months ago
Fast PDA Synchronization Using Characteristic Polynomial Interpolation
—Modern Personal Digital Assistant (PDA) architectures often utilize a wholesale data transfer protocol known as “slow sync” for synchronizing PDAs with Personal Computers (P...
Ari Trachtenberg, David Starobinski, Sachin Agarwa...
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
15 years 9 months ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
ISCC
2002
IEEE
108views Communications» more  ISCC 2002»
15 years 9 months ago
An integrated architecture for the scalable delivery of semi-dynamic Web content
The competition on clients attention requires sites to update their content frequently. As a result, a large percentage of web pages are semi-dynamic, i.e., change quite often and...
Danny Dolev, Osnat Mokryn, Yuval Shavitt, Innocent...
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
15 years 9 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
« Prev « First page 1226 / 1466 Last » Next »