Sciweavers

47 search results - page 7 / 10
» Analysis of the HIP Base Exchange Protocol
Sort
View
WECWIS
2007
IEEE
148views ECommerce» more  WECWIS 2007»
14 years 1 months ago
The Core and Shapley Value Analysis for Cooperative Formation of Procurement Networks
Formation of high value procurement networks involves a bottom-up assembly of complex production, assembly, and exchange relationships through supplier selection and contracting d...
T. S. Chandrashekar, Y. Narahari
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 7 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...
ICCCN
2008
IEEE
14 years 2 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda