Back to Results
First PageMeta Content
Electronic commerce / File sharing networks / Key management / Friend-to-friend / Peer-to-peer / F2F / Social peer-to-peer processes / Public key certificate / Voice over IP / Cryptography / Public-key cryptography / Internet privacy


Document Date: 2005-07-21 13:30:56


Open Document

File Size: 67,01 KB

Share Result on Facebook

City

Monterey / Oxford / Las Vegas / Reykjavik / /

Company

AES / Skype / Ford / memFigure / /

Country

United States / Iceland / United Kingdom / /

/

Event

FDA Phase / /

IndustryTerm

proposed reputation management systems / content in services / overlay networks / ordinary netA best effort routing protocol / telephony / ad-hoc networks / packet radio networks / to these networks / membership management / connection oriented protocol / digital communications / even impossistandard ad-hoc networks / distributed computing / easy and ad-hoc networks / Internet Service Provider / internet connection / reputation management / datagram networks / reputation management systems / Internet engineering task force / internet routing protocols / reputation systems / database-based reputation management / todays broadband internet connection / internet today / management protocol / grid computing / internet users / database management / communication networks / ad-hoc network / ant colony algorithms / exammission control protocol / /

Organization

Root / Helsinki University of Technology / Full / Certificate Authority / Trial / /

Person

A. Shree Murthy / Donald / Katri Ylitalo / Charlie / M. Gupta / Alice / /

Position

P. Judge / tutor / P. Judge / and M. Ammar / /

Product

F2F / RFC2246 / P2P / /

ProvinceOrState

Nevada / /

RadioStation

KCIF / /

Technology

IP telephony / Public Key Infrastructure / broadband / effort routing protocol / peer-to-peer / underlying F2F network protocols / PKI / P2P / private key / P2P protocol / mobile device / internet routing protocols / operating systems / management protocol / mobile devices / encryption / Cryptography / exammission control protocol / routing protocol / public key / Mobile Computing / file sharing / ISP / two ant colony algorithms / presented protocol / Implementing protocol / digital signature / be verified using the public key / /

URL

http /

SocialTag