Sciweavers

1180 search results - page 181 / 236
» Interaction Protocols in Agentis
Sort
View
INFOCOM
2007
IEEE
15 years 11 months ago
Congestion Control for Small Buffer High Speed Networks
— There is growing interest in designing high speed routers with small buffers that store only tens of packets. Recent studies suggest that TCP NewReno, with the addition of a pa...
Yu Gu, Donald F. Towsley, C. V. Hollot, Honggang Z...
142
Voted
POLICY
2007
Springer
15 years 10 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
132
Voted
BROADNETS
2005
IEEE
15 years 10 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
IEEESCC
2005
IEEE
15 years 10 months ago
Context Aware Session Management for Services in Ad Hoc Networks
— The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues r...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...
ESORICS
2005
Springer
15 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento