Sciweavers

2562 search results - page 298 / 513
» An Internet without the Internet protocol
Sort
View
139
Voted
NETWORKING
2008
15 years 5 months ago
Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks
Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 3 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
122
Voted
COMCOM
2007
99views more  COMCOM 2007»
15 years 3 months ago
Topology-aware overlay path probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
Chiping Tang, Philip K. McKinley
COMCOM
2007
78views more  COMCOM 2007»
15 years 3 months ago
Multihoming route control among a group of multihomed stub networks
In recent years, commercial “Multihoming Route Control” devices are used by multihomed stub networks to optimize the routing of their Internet traffic. Previous studies have sh...
Yong Liu, A. L. Narasimha Reddy
JCS
2006
113views more  JCS 2006»
15 years 3 months ago
Blind Electronic Commerce
Privacy in Electronic Commerce transactions is the subject of ever increasing research. However, many challenges remain to be overcome. For example, let us consider a customer, Si...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...