2

Fundamental architectural considerations for network processors

Year:
2003
Language:
english
File:
PDF, 178 KB
english, 2003
4

Decentralized network connection preemption algorithms

Year:
1998
Language:
english
File:
PDF, 385 KB
english, 1998
6

Hash-based encryption system

Year:
1999
Language:
english
File:
PDF, 647 KB
english, 1999
9

Methods for preventing unauthorized software distribution

Year:
2003
Language:
english
File:
PDF, 91 KB
english, 2003
10

Bandwidth efficiency of the networking broadband services architecture: A case study

Year:
1996
Language:
english
File:
PDF, 1.49 MB
english, 1996
11

Enabling ATM networks

Year:
1996
Language:
english
File:
PDF, 164 KB
english, 1996
12

Algorithm for efficient generation of link-state updates in ATM networks

Year:
1997
Language:
english
File:
PDF, 1.08 MB
english, 1997
13

Secure remote user access over insecure networks

Year:
2006
Language:
english
File:
PDF, 315 KB
english, 2006
14

Non-PKI methods for public key distribution

Year:
2004
Language:
english
File:
PDF, 108 KB
english, 2004
17

Multiparty Biometric-Based Authentication

Year:
2000
Language:
english
File:
PDF, 73 KB
english, 2000
19

Generating user-based cryptographic keys and random numbers

Year:
1999
Language:
english
File:
PDF, 782 KB
english, 1999
20

Asynchronous transfer mode security

Year:
1997
Language:
english
File:
PDF, 990 KB
english, 1997
22

Alternative Method for Unique RSA Primes Generation

Year:
2001
Language:
english
File:
PDF, 181 KB
english, 2001
26

Decentralized group key management for secure multicast communications

Year:
1999
Language:
english
File:
PDF, 69 KB
english, 1999
27

A structured symmetric-key block cipher

Year:
1999
Language:
english
File:
PDF, 1.11 MB
english, 1999
29

Efficient transport and distribution of network control information in NBBS

Year:
1995
Language:
english
File:
PDF, 2.16 MB
english, 1995
31

Methods for Protecting Password Transmission

Year:
2000
Language:
english
File:
PDF, 59 KB
english, 2000
33

Reversible data mixing procedure for efficient public-key encryption

Year:
1998
Language:
english
File:
PDF, 754 KB
english, 1998
34

Network path caching:: Issues, algorithms and a simulation study

Year:
1997
Language:
english
File:
PDF, 190 KB
english, 1997
36

Ticket and Challenge-Based Protocols for Timestamping

Year:
2000
Language:
english
File:
PDF, 98 KB
english, 2000
40

Construction of protocol converters using formal methods

Year:
1993
Language:
english
File:
PDF, 1.27 MB
english, 1993
43

On probabilities of hash value matches

Year:
1998
Language:
english
File:
PDF, 494 KB
english, 1998
44

Network Processor Design || IBM—PowerNP Network Processor

Year:
2003
Language:
english
File:
PDF, 2.43 MB
english, 2003