Sort by: Order: Results:

Now showing items 2209-2215 of 2215

  • X509Cloud - Framework for a Ubiquitous PKI 

    Weber, Stefan; Tewari, Hitesh; Hughes, Arthur; Barry, Tomas (2017)
    The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...
  • An XG-PON Module for the NS-3 Network Simulator 

    Ruffini, Marco; Doyle, Linda; Marchetti, Nicola (2013)
    10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regar ded as one of the key technologies for future Internet access net - works. In this paper, we propose ...
  • XYZ Privacy 

    Mc Goldrick, Ciaran; Joy, Josh; Gray, Dylan; Gerla, Mario (2018)
    Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most ...
  • YABS: A domain-specific language for pervasive computing based on stigmergy 

    CAHILL, VINNY (2006)
    This paper presents YABS, a novel domain-specific language for defining entity behavior in pervasive computing environments. The programming model of YABS is inspired by nature and, in particular, the observations made ...
  • Zohreh Khosrobeigi, Maria Koutsombogera, Carl Vogel 

    Vogel, Carl; Khosrobeigi, Zohreh; Koutsombogera, Maria (2023)
    This paper studies the relationship between conversational features related to gesture, conversational dominance, collaboration, and personality traits. Specifically, we examine the interaction of motion energy and factors ...
  • The ZRTP Protocol - Analysis on the Diffie-Hellman mode 

    BRESCIANI, RICCARDO (2009)
    ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle ...
  • Untitled 

    KENNY, EAMONN (2000)
    The increase in mobile communications traffic has led to heightened interest in the use of deterministic propagation methods together with digital building and terrain databases for propagation prediction in urban areas. ...