Sciweavers

43 search results - page 5 / 9
» A Certified Email Protocol Using Key Chains
Sort
View
KBSE
2003
IEEE
14 years 18 days ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
SACI
2007
IEEE
14 years 1 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
INFOCOM
2003
IEEE
14 years 19 days ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
ECUMN
2007
Springer
14 years 1 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
JTAER
2007
90views more  JTAER 2007»
13 years 7 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman