Sciweavers

31 search results - page 3 / 7
» Intermediary Non-repudiation Protocols
Sort
View
INFOCOM
2007
IEEE
14 years 4 months ago
Addressing Click Fraud in Content Delivery Systems
—Mechanisms for data access and payment are central to the success of content delivery systems. However, not much attention has been paid to the issues of dishonest intermediarie...
Saugat Majumdar, Dhananjay Kulkarni, Chinya V. Rav...
ICICS
2003
Springer
14 years 3 months ago
Practical Service Charge for P2P Content Distribution
With emerging decentralized technologies, peer-to-peer (P2P) content distribution arises as a new model for storage and transmission of data. In this scenario, one peer can be play...
Jose Antonio Onieva, Jianying Zhou, Javier Lopez
SEC
2004
13 years 11 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
INFOCOM
2000
IEEE
14 years 2 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...
PRIMA
2004
Springer
14 years 3 months ago
Supporting Impromptu Coordination Using Automated Negotiation
We are concerned with forms of interaction in which multiple users, with differing agendas and interests, may realise opportunities for useful synchronisation of their activities. ...
Iyad Rahwan, Connor Graham, Liz Sonenberg