Sciweavers

14824 search results - page 2651 / 2965
» Security - Introduction
Sort
View
IPPS
1998
IEEE
15 years 7 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
108
Voted
NDSS
1998
IEEE
15 years 7 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
15 years 7 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
15 years 7 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...
130
Voted
ICDCS
1996
IEEE
15 years 7 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
« Prev « First page 2651 / 2965 Last » Next »