Sciweavers

43 search results - page 6 / 9
» A Certified Email Protocol Using Key Chains
Sort
View
EUROIMSA
2006
106views Multimedia» more  EUROIMSA 2006»
13 years 8 months ago
Plugging Presence Awareness into Mozilla Thunderbird
Presence awareness, that is the awareness of what distant colleagues are doing and their availability for interaction, plays a key role for coping with the lack of physical proxim...
Fabio Calefato, Filippo Lanubile
WPES
2004
ACM
14 years 23 days ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
AINA
2009
IEEE
14 years 2 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
IWCMC
2006
ACM
14 years 1 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
DRM
2003
Springer
14 years 17 days ago
The Darknet and the Future of Content Protection
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...