Sciweavers

1801 search results - page 299 / 361
» Implementation-Oriented Secure Architectures
Sort
View
136
Voted
IJNSEC
2008
135views more  IJNSEC 2008»
15 years 3 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
MTA
2006
125views more  MTA 2006»
15 years 3 months ago
QCWS: an implementation of QoS-capable multimedia web services
QoS, that defines service quality such as latency, availability, timeliness and reliability, is important for web applications that provide real-time information, multimedia conte...
Tao Yu, Kwei-Jay Lin
PERVASIVE
2008
Springer
15 years 3 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
JNW
2007
113views more  JNW 2007»
15 years 3 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
WICOMM
2008
108views more  WICOMM 2008»
15 years 3 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos