Sciweavers

76 search results - page 6 / 16
» Deniable Internet Key Exchange
Sort
View
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
ICC
2009
IEEE
13 years 5 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
MSO
2003
13 years 9 months ago
Simulating Resource and Service Trading in Grid Systems
The global grid model is steadily being uptaken by individuals wishing to trade in grid services. The grid was originally driven by organisations attempting to share high performa...
Heath A. James, Kenneth A. Hawick
IEEECIT
2010
IEEE
13 years 6 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...
CCS
2001
ACM
14 years 6 days ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...