Sciweavers

480 search results - page 30 / 96
» Anonymous Transactions in Computer Networks
Sort
View
CSE
2009
IEEE
14 years 1 months ago
Scaling Behaviors in the Communication Network between Cities
—We analyze the anonymous communication patterns of 2.5 million customers of a Belgian mobile phone operator. With these communications, we construct a social network of customer...
Gautier Krings, Francesco Calabrese, Carlo Ratti, ...
MOBICOM
2010
ACM
13 years 9 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
CCS
2009
ACM
14 years 3 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
LCN
2000
IEEE
14 years 1 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
KIVS
2005
Springer
14 years 2 months ago
A Comparison of WS-BusinessActivity and BPEL4WS Long-Running Transaction
Although WS-BusinessActivity and BPEL4WS Long-Running Transaction (LRT) are conceptually very similar and are both designed to support the execution of complex business transaction...
Patrick Sauter, Ingo Melzer