Sciweavers

2478 search results - page 110 / 496
» Message from the Chair
Sort
View
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 10 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
ICPADS
2005
IEEE
15 years 10 months ago
A Distributed IP Address Assignment Scheme for Ad Hoc Networks
In this paper, we present a scheme to assign IP address to each newly-joined node. Some nodes are assigned as coordinators, and are responsible for assigning an IP address to a ne...
Jang-Ping Sheu, Shin-Chih Tu, Li-Hsiang Chan
ITRE
2005
IEEE
15 years 10 months ago
Securing RSVP and RSVP-TE signaling protocols and their performance study
RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...
COCO
2005
Springer
141views Algorithms» more  COCO 2005»
15 years 10 months ago
Upper Bounds for Quantum Interactive Proofs with Competing Provers
Refereed games are interactive proof systems with two competing provers: one that tries to convince the verifier to accept and another that tries to convince the verifier to rej...
Gus Gutoski
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 9 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson