Sciweavers

609 search results - page 85 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ICEBE
2009
IEEE
136views Business» more  ICEBE 2009»
13 years 5 months ago
Virtual Wealth Realization in Virtual and Real Worlds
This paper has investigated the issue of virtual wealth and its realization in both real and virtual worlds, and argued that the realization of virtual wealth is necessary and pos...
Jingzhi Guo, Angelina Chow, Zhiguo Gong, Chengzhen...
BRAIN
2010
Springer
13 years 4 months ago
Domain-Specific Modeling as a Pragmatic Approach to Neuronal Model Descriptions
Biologically realistic modeling has been greatly facilitated by the development of neuro-simulators, and the development of simulatorindependent formats for model exchange is the s...
Ralf Ansorg, Lars Schwabe

Publication
117views
13 years 3 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
JCAM
2010
111views more  JCAM 2010»
13 years 2 months ago
Finite element simulation of compressible particle-laden gas flows
A macroscopic two-fluid model of compressible particle-laden gas flows is considered. The governing equations are discretized by a high-resolution finite element method based on a...
Marcel Gurris, Dmitri Kuzmin, Stefan Turek
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour