Sciweavers

2562 search results - page 170 / 513
» An Internet without the Internet protocol
Sort
View
ICNSC
2007
IEEE
14 years 5 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar
CAISE
2007
Springer
14 years 4 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
EPEW
2005
Springer
14 years 4 months ago
Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step
Abstract. Global choreographies define the rules that peers should respect in their interaction, with the aim of guaranteeing interoperability. act choreography can be seen as a p...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
14 years 4 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 4 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas