Sciweavers

2316 search results - page 28 / 464
» How Asymmetric Is the Internet
Sort
View
ICDE
1998
IEEE
82views Database» more  ICDE 1998»
14 years 11 months ago
Safeguarding and Charging for Information on the Internet
With the growing acceptance of the Internet as a new dissemination medium, several new and interesting challenges arise in building a digital commerce infrastructure. In this arti...
Hector Garcia-Molina, Steven P. Ketchpel, Narayana...
CTRSA
2010
Springer
211views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
Léo Ducas
ENTCS
2007
96views more  ENTCS 2007»
13 years 9 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
CHI
2005
ACM
14 years 10 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
INFOCOM
2007
IEEE
14 years 4 months ago
Combining Multihoming with Overlay Routing (or, How to Be a Better ISP without Owning a Network)
— Multihoming and overlay routing are used, mostly separately, to bypass Internet outages, congested links and long routes. In this paper, we examine a scenario in which multihom...
Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar