Sciweavers

5324 search results - page 823 / 1065
» Internet Security Protocols
Sort
View
EUROCRYPT
1995
Springer
14 years 2 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
WIS
2004
14 years 11 hour ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
ICIP
2003
IEEE
15 years 7 days ago
Rate-distortion optimized interactive browsing of JPEG2000 images
This paper is concerned with remote browsing of JPEG2000 compressed imagery. A potentially interactive client identifies a region and maximum resolution of interest. The server re...
David Taubman, René Rosenbaum

Publication
243views
14 years 9 months ago
A Java-based Wrapper for Wireless Communications
The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications hav...
Alessandro Genco, Antonio Gentile, Cono Ferrarotto...
ICAS
2009
IEEE
184views Robotics» more  ICAS 2009»
14 years 5 months ago
Open IMS Core with VoIP Quality Adaptation
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...
Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiy...