Sciweavers

1779 search results - page 168 / 356
» Secure Communications in ATM Networks
Sort
View
EUROPAR
2003
Springer
15 years 9 months ago
Short Message Service in a Grid-Enabled Computing Environment
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
Fenglian Xu, M. Hakki Eres, Simon J. Cox
PIMRC
2008
IEEE
15 years 11 months ago
A hybrid P2P/Infrastructure platform for personal and social Internet services
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
Dimitris N. Kalofonos, Zoe Antoniou
ANCS
2008
ACM
15 years 6 months ago
Towards effective network algorithms on multi-core network processors
To build high-performance network devices with holistic security protection, a large number of algorithms have been proposed. However, multi-core implementation of the existing al...
Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo...
125
Voted
COMCOM
2006
70views more  COMCOM 2006»
15 years 4 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
SASN
2006
ACM
15 years 10 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li