Sciweavers

4761 search results - page 759 / 953
» Performance of Protocols
Sort
View
102
Voted
WISA
2004
Springer
15 years 9 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
INFOCOM
2002
IEEE
15 years 8 months ago
Efficient Distributed Path Selection for Shared Restoration Connections
—In MPLS/GMPLS networks, a range of restoration schemes will be required to support different tradeoffs between service interruption time and network resource utilization. In lig...
Guangzhi Li, Dongmei Wang, Charles R. Kalmanek, Ro...
114
Voted
ACSAC
2000
IEEE
15 years 8 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
139
Voted
ACSAC
2006
IEEE
15 years 7 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
118
Voted
WWW
2010
ACM
15 years 4 months ago
Protocol-aware matching of web service interfaces for adapter development
With the rapid growth in the number of online Web services, the problem of service adaptation has received significant attention. In matching and adaptation, the functional descri...
Hamid R. Motahari Nezhad, Guang Yuan Xu, Boualem B...