Sciweavers

4880 search results - page 793 / 976
» Mechanism Design by Creditability
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
CN
2007
94views more  CN 2007»
15 years 4 months ago
Modeling and generating realistic streaming media server workloads
Currently, Internet hosting centers and content distribution networks leverage statistical multiplexing to meet the performance requirements of a number of competing hosted networ...
Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vah...
CN
2007
97views more  CN 2007»
15 years 4 months ago
A longest prefix first search tree for IP lookup
- One of the key design issues for IP routers is the IP Lookup mechanism. IP lookup is an important action in router that is to find the next hop of each incoming packet with a lon...
Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen
CN
2007
137views more  CN 2007»
15 years 4 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
150
Voted
COMCOM
2007
142views more  COMCOM 2007»
15 years 4 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...