Sciweavers

2316 search results - page 96 / 464
» How Asymmetric Is the Internet
Sort
View
175
Voted
TIFS
2011
252views Education» more  TIFS 2011»
14 years 11 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
OTM
2007
Springer
15 years 10 months ago
MultiBeeBrowse - Accessible Browsing on Unstructured Metadata
Abstract. Growing abundance of information on the Internet, especially the Next Generation Internet, poses even more challenges on more efficient information management; hence it h...
Sebastian Ryszard Kruk, Adam Gzella, Filip Czaja, ...
ACSW
2006
15 years 5 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
ICIS
2000
15 years 5 months ago
Economic returns to firms from business-to-business electronic commerce initiatives: an empirical examination
Do firms derive economic returns from business-to-business(B2B) initiatives? How do returns to startup firms compare to those for established firms in B2B initiatives? How do retu...
Mani R. Subramani, Eric Walden
CIMCA
2006
IEEE
15 years 10 months ago
Assessing and Assuring Trust in E-Commerce Systems
On-line trading or Internet Commerce restoring to ECommerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the u...
Zhongwei Zhang, Zhen Wang