Sciweavers

2951 search results - page 381 / 591
» Secure Distributed DNS
Sort
View
CORR
2010
Springer
68views Education» more  CORR 2010»
15 years 5 months ago
Comparative Study of Protocols Used for Establishing VPN
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also beco...
P. Venkateswari, T. Purusothaman
CORR
2008
Springer
96views Education» more  CORR 2008»
15 years 4 months ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt
CORR
2007
Springer
109views Education» more  CORR 2007»
15 years 4 months ago
The MIMOME Channel
— The MIMOME channel is a Gaussian wiretap channel in which the sender, receiver, and eavesdropper all have multiple antennas. We characterize the secrecy capacity as the saddle-...
Ashish Khisti, Gregory W. Wornell
JPDC
2006
134views more  JPDC 2006»
15 years 4 months ago
Fast shared-memory algorithms for computing the minimum spanning forest of sparse graphs
Minimum Spanning Tree (MST) is one of the most studied combinatorial problems with practical applications in VLSI layout, wireless communication, and distributed networks, recent ...
David A. Bader, Guojing Cong
SCN
2008
Springer
15 years 4 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...