Sciweavers

762 search results - page 51 / 153
» Behavioural Models for Group Communications
Sort
View
CCS
2008
ACM
13 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
CW
2003
IEEE
14 years 2 months ago
Interactive Distributed Guided Tours of Historical Sites
In this paper we propose a new metaphor of information retrieving, usable in heritage management and publishing. Based on the net, the user is able to participate in virtual guide...
Dorin Mircea Popovici, Serge Morvan, Eric Maisel, ...
OHS
2001
Springer
14 years 1 months ago
Auld Leaky: A Contextual Open Hypermedia Link Server
The work of the Open Hypermedia Systems Working Group (OHSWG) has lead to the creation of several hypermedia models and a common protocol for Navigational Hypertext. However none o...
Danius T. Michaelides, David E. Millard, Mark J. W...
GLOBECOM
2007
IEEE
14 years 3 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
CHI
2004
ACM
14 years 9 months ago
Email task management styles: the cleaners and the keepers
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Jacek Gwizdka