Sciweavers

2656 search results - page 45 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
CCS
2007
ACM
14 years 4 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
ECRTS
2004
IEEE
14 years 1 months ago
Low-Latency Hard Real-Time Communication over Switched Ethernet
Ethernet, the most widely used commodity network, increasingly moves toward switches as implementation technology thus replacing busses. This allows to use traf
Jork Löser, Hermann Härtig
COBUILD
1998
Springer
14 years 2 months ago
An Agent-Based Telecooperation Framework
Abstract. As the amount of information and communication increases dramatically new working environments must provide efficient mechanisms to maximize the benefits of these develop...
Albrecht Schmidt, Alexander Specker, Gerhard Parts...
TITB
2010
128views Education» more  TITB 2010»
13 years 4 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
SP
2006
IEEE
14 years 4 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson