Sciweavers

849 search results - page 57 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
CN
2006
107views more  CN 2006»
13 years 7 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 8 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
AWIC
2003
Springer
14 years 28 days ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
ICDE
2001
IEEE
113views Database» more  ICDE 2001»
14 years 9 months ago
Measuring and Optimizing a System for Persistent Database Sessions
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...
Roger S. Barga, David B. Lomet
JWSR
2006
139views more  JWSR 2006»
13 years 7 months ago
Supporting Predictable Service Provision in MANETs Via Context-Aware Session Management
: The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues rel...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...