Sciweavers

98 search results - page 5 / 20
» Risks of the CardSpace Protocol
Sort
View
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 7 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
PERCOM
2005
ACM
14 years 7 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
EDCC
2008
Springer
13 years 9 months ago
Targeted Distribution of Resource Allocation for Backup LSP Computation
Under the hypothesis of single failures in the network, some backup paths cannot be active at the same time because they protect against the failure of different components. Hence...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
CIA
1998
Springer
13 years 11 months ago
The Dynamics of the UMDL Service Market Society
One of our goals when building the University of Michigan Digital Library UMDL has been to prototype an architecture that can continually recon gure itself as users, contents, and ...
Edmund H. Durfee, Tracy Mullen, Sunju Park, Jos&ea...
AAMAS
1999
Springer
13 years 7 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh