Sciweavers

2265 search results - page 353 / 453
» Recovering Exchanged Data
Sort
View
EDOC
2008
IEEE
14 years 3 months ago
On Creating Industry-Wide Reference Architectures
Many industries have been developing e-business standards to improve business-to-business interoperability on a mass scale. Most such standards are composed of business data model...
Liming Zhu, Mark Staples, Vladimir Tosic
ICCCN
2008
IEEE
14 years 3 months ago
Performance Study of Unstructured P2P Overlay Streaming Systems
—One of the major differences among current P2P solutions for multimedia streaming is the way they organize the exchange of multimedia data among their peers. We compare the perf...
Purvi Shah, Jawad Rasheed, Jehan-François P...
ICCCN
2008
IEEE
14 years 3 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IEEEIAS
2008
IEEE
14 years 3 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
PIMRC
2008
IEEE
14 years 3 months ago
Downlink overhead reduction for Multi-Cell Cooperative Processing enabled wireless networks
—Multi-cell Cooperative Processing (MCP) has been recognised as an efficient technique for increasing spectral efficiency of future cellular systems. However the provided bene...
Agisilaos Papadogiannis, Hans Jørgen Bang, ...