Sciweavers

76 search results - page 13 / 16
» Deniable Internet Key Exchange
Sort
View
ENTCS
2006
140views more  ENTCS 2006»
13 years 7 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
CN
2007
96views more  CN 2007»
13 years 7 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
COMCOM
2002
105views more  COMCOM 2002»
13 years 7 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
WWW
2003
ACM
14 years 28 days ago
Experience With Teaching and Learning in Cooperative Knowledge Areas
Since the early 1990s, different infrastructures for supporting learning have been developed and practically tested in Paderborn. One of the key products of our research is the we...
Thorsten Hampel, Reinhard Keil-Slawik
DSRT
2005
IEEE
14 years 1 months ago
Modeling Real-Time Distributed Simulation Message Flow in an Open Network
Understanding the characteristics of information flow in large scale real-time distributed virtual simulations (RT-DVS) is important for the development of network services that a...
Dennis M. Moen, J. Mark Pullen