Sciweavers

1573 search results - page 177 / 315
» Strong User Authentication
Sort
View
99
Voted
SCN
2004
Springer
112views Communications» more  SCN 2004»
15 years 7 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
SELMAS
2004
Springer
15 years 7 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
ARTQOS
2003
Springer
15 years 7 months ago
An IP QoS Architecture for 4G Networks
: This paper describes an architecture for differentiation of Quality of Service in heterogeneous wireless-wired networks. This architecture applies an “all-IP” paradigm, with ...
Janusz Gozdecki, Piotr Pacyna, Victor Marques, Rui...
76
Voted
ICWE
2003
Springer
15 years 7 months ago
Serverless Web-Multicast Chat System for Multi-users
Abstract. CSCW applications require availability, portability, familiarity, scalability, bandwidth and performance. This paper describes the use of Web-multicasting to address thes...
Md. Asri Ngadi, Bernard S. Doherty
122
Voted
IPTPS
2003
Springer
15 years 7 months ago
Scooped, Again
The Peer-to-Peer (p2p) and Grid infrastructure communities are tackling an overlapping set of problems. In addressing these problems, p2p solutions are usually motivated by elegan...
Jonathan Ledlie, Jeffrey Shneidman, Margo I. Seltz...