Sciweavers

6689 search results - page 1244 / 1338
» A Network Security Monitor
Sort
View
NDSS
1998
IEEE
14 years 3 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
PODC
2010
ACM
14 years 3 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
AINA
2004
IEEE
14 years 2 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
APNOMS
2006
Springer
14 years 2 months ago
A Framework Supporting Quality of Service for SOA-Based Applications
Web Services and Service-Oriented Architecture (SOA) has been playing an important role as a middleware for interoperable transactions such as Business-to-Business and Enterprise A...
Phung Huu Phu, Dae Seung Yoo, Myeongjae Yi
CCGRID
2001
IEEE
14 years 2 months ago
Latency Hiding in Dynamic Partitioning and Load Balancing of Grid Computing Applications
The Information Power Grid (IPG) concept developed by NASA is aimed to provide a metacomputing platform for large-scale distributed computations, by hiding the intricacies of a hig...
Sajal K. Das, Daniel J. Harvey, Rupak Biswas
« Prev « First page 1244 / 1338 Last » Next »