Sciweavers

630 search results - page 39 / 126
» Acceptable internet use policy
Sort
View
MASCOTS
2010
13 years 9 months ago
Content Delivery Using Replicated Digital Fountains
With a majority of Internet traffic being predicted to be caused by content delivery, it is clear that content delivery applications will consume much of the resources on the Inter...
Niklas Carlsson, Derek L. Eager
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
13 years 12 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
MMMACNS
2010
Springer
13 years 6 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
SEMWEB
2007
Springer
14 years 1 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
INFOCOM
2002
IEEE
14 years 20 days ago
Channel Sharing by Rate Adaptive Streaming Applications
There are various techniques for adapting the transmission rate of an application while maintaining the perceived quality at the receiver at acceptable levels. Shared channel syst...
Leonidas Georgiadis, Nikos Argiriou