October 18, 2014

Selfish Overlay Network Creation and Maintenance | FTD1125

Selfish Overlay Network Creation and Maintenance : IEEE 2011 Abstract: A foundational issue underlying many overlay net­work applications ranging from routing to peer-to-peer file sharing is […]
October 18, 2014

Secure and User Friendly PIN Entry Method |FTJ1009

Secure and User Friendly PIN Entry Method : IEEE2010 Abstract—Personal identification number (PIN) is a common user authentication method widely used for ATMs and mobile phones. […]
October 18, 2014

Reputation-Based Resource Allocation in P2P Systems of Rational Users |FTJ1008

Reputation-Based Resource Allocation in P2P Systems of Rational Users : IEEE2010 Abstract—In this paper, we study p2p systems, where peers have to share their available resources […]
October 18, 2014

Secure High-Throughput Multicast Routing in Wireless Mesh Networks | FTD1124

Secure High-Throughput Multicast Routing in Wireless Mesh Networks : IEEE 2011 Abstract: Recent work in multicast routing for wireless mesh networks has focused on metrics that […]
October 18, 2014

Online Banking Authentication Using Mobile Phones |FTJ1007

Online Banking Authentication Using Mobile Phones : IEEE2010 Abstract—Online banking authentication plays an important role in the field of online banking security. In past years, a […]