Sciweavers

3257 search results - page 561 / 652
» networking 2004
Sort
View
74
Voted
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 3 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
75
Voted
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
15 years 3 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox
84
Voted
ADVIS
2004
Springer
15 years 3 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
92
Voted
AP2PC
2004
Springer
15 years 3 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
85
Voted
APPROX
2004
Springer
149views Algorithms» more  APPROX 2004»
15 years 3 months ago
Edge Coloring with Delays
Consider the following communication problem, that leads to a new notion of edge coloring. The communication network is represented by a bipartite multigraph, where the nodes on o...
Noga Alon, Vera Asodi