Sciweavers

1674 search results - page 284 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
ICDCS
2002
IEEE
14 years 1 months ago
On Peer-to-Peer Media Streaming
In this paper, we study a peer-to-peer media streaming system with the following characteristics: (1) its streaming capacity grows dynamically; (2) peers do not exhibit serverlike...
Dongyan Xu, Mohamed Hefeeda, Susanne E. Hambrusch,...
NDSS
2002
IEEE
14 years 1 months ago
Performance Analysis of TLS Web Servers
TLS is the protocol of choice for securing today’s ecommerce and online transactions, but adding TLS to a web server imposes a significant overhead relative to an insecure web ...
Cristian Coarfa, Peter Druschel, Dan S. Wallach
IWQOS
2001
Springer
14 years 1 months ago
QoS-Aware Adaptive Services in Mobile Ad-Hoc Networks
Ad-hoc wireless networks consist of mobile nodes interconnected by multi-hop wireless paths. Unlike conventional wireless networks, ad-hoc networks have no fixed network infrastru...
Baochun Li
LCPC
2001
Springer
14 years 1 months ago
Bridging the Gap between Compilation and Synthesis in the DEFACTO System
Abstract. The DEFACTO project - a Design Environment For Adaptive Computing TechnOlogy - is a system that maps computations, expressed in high-level languages such as C, directly o...
Pedro C. Diniz, Mary W. Hall, Joonseok Park, Byoun...