Sciweavers

3638 search results - page 53 / 728
» Distribution chain security
Sort
View
WSC
2001
13 years 10 months ago
Towards COTS distributed simulation using GRIDS
This paper reports on continuing work that concerns research into the development of a commercial off the shelf (COTS) distributed simulation environment (federation) using the Ge...
Simon J. E. Taylor, Rajeev Sudra, Tharumasegaram J...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 1 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
CSDA
2008
62views more  CSDA 2008»
13 years 9 months ago
Waiting time distribution of generalized later patterns
In this paper the concept of later waiting time distributions for patterns in multi-state trials is generalized to cover a collection of compound patterns that must all be counted...
Donald E. K. Martin, John A. D. Aston
COMCOM
2006
194views more  COMCOM 2006»
13 years 9 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
TIP
2010
137views more  TIP 2010»
13 years 3 months ago
Adaptive Langevin Sampler for Separation of t-Distribution Modelled Astrophysical Maps
We propose to model the image differentials of astrophysical source maps by Student's t-distribution and to use them in the Bayesian source separation method as priors. We int...
Koray Kayabol, Ercan E. Kuruoglu, José Luis...