Sciweavers

100 search results - page 19 / 20
» Public Key Authentication Schemes for Local Area Networks
Sort
View
PET
2010
Springer
13 years 10 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
SIGOPSE
2004
ACM
13 years 11 months ago
Long-term time-share guarantees are necessary for wireless LANs
Wireless local area networks (WLANs) based on a family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at...
Godfrey Tan, John V. Guttag
BMCBI
2004
98views more  BMCBI 2004»
13 years 6 months ago
STING Millennium Suite: integrated software for extensive analyses of 3d structures of proteins and their complexes
Background: The integration of many aspects of protein/DNA structure analysis is an important requirement for software products in general area of structural bioinformatics. In fa...
Roberto H. Higa, Roberto C. Togawa, Arnaldo J. Mon...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
P2P
2003
IEEE
130views Communications» more  P2P 2003»
13 years 11 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...