Sciweavers

2562 search results - page 171 / 513
» An Internet without the Internet protocol
Sort
View
IJCAI
2001
14 years 3 days ago
Bundle Design in Robust Combinatorial Auction Protocol against False-name Bids
This paper presents a method for designing bundles in a combinatorial auction protocol that is robust against false-name bids. Internet auctions have become an integral part of El...
Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara
IANDC
2008
128views more  IANDC 2008»
13 years 10 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
COMSUR
2007
101views more  COMSUR 2007»
13 years 10 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 10 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
13 years 8 months ago
A hybrid FEC-ARQ protocol for low-delay lossless sequential data streaming
Interactive Internet Applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of seq...
Ying-zong Huang, Sanjeev Mehrotra, Jin Li