Sciweavers

609 search results - page 98 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 27 days ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
DRM
2003
Springer
14 years 25 days ago
The IP war: apocalypse or revolution?
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultim...
Tsvi Gal, Howard M. Singer, Laird Popkin
ICDE
2002
IEEE
181views Database» more  ICDE 2002»
14 years 17 days ago
YFilter: Efficient and Scalable Filtering of XML Documents
Soon, much of the data exchanged over the Internet will be encoded in XML, allowing for sophisticated filtering and content-based routing. We have built a filtering engine called ...
Yanlei Diao, Peter M. Fischer, Michael J. Franklin...
COMPSAC
2009
IEEE
14 years 10 days ago
Towards a Next-Generation Matrix Library for Java
Matrices are essential in many fields of computer science, especially when large amounts of data must be handled efficiently. Despite this demand for matrix software, we were una...
Holger Arndt, Markus Bundschus, Andreas Naegele
WETICE
1998
IEEE
13 years 12 months ago
WebGroup: A Secure Group Access Control Tool for the World-Wide Web
We present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-gra...
Fabien A. P. Petitcolas, Kan Zhang