Sciweavers

4111 search results - page 757 / 823
» Security, Protocols, and Trust
Sort
View
RIVF
2007
13 years 10 months ago
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
IADIS
2004
13 years 10 months ago
The efficient communications for VPN access of mobile nodes over mobile IPV6
Mobile IPv6 is thought to be dominant protocol for providing mobility. In the near future, most portable communication devices will deploy Mobile IPv6 mechanism. Our main concerns...
Hyungkyu Lee, Jaehoon Nah, Kyoil Jung
ICWS
2003
IEEE
13 years 10 months ago
SOAP Optimization via Client Side Caching
The Simple Object Access Protocol (SOAP) [1] is an emerging technology in the field of web services. Web services demand high performance, security and extensibility. SOAP, being ...
Kiran Devaram, Daniel Andresen
OSDI
2000
ACM
13 years 10 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
ASIAN
2009
Springer
299views Algorithms» more  ASIAN 2009»
13 years 10 months ago
Deducibility Constraints
In their work on tractable deduction systems, D. McAllester and later D. Basin and H. Ganzinger have identified a property of inference systems (the locality property) that ensures...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...