Sciweavers

3638 search results - page 53 / 728
» Distribution chain security
Sort
View
WSC
2001
15 years 3 months ago
Towards COTS distributed simulation using GRIDS
This paper reports on continuing work that concerns research into the development of a commercial off the shelf (COTS) distributed simulation environment (federation) using the Ge...
Simon J. E. Taylor, Rajeev Sudra, Tharumasegaram J...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 7 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
CSDA
2008
62views more  CSDA 2008»
15 years 2 months ago
Waiting time distribution of generalized later patterns
In this paper the concept of later waiting time distributions for patterns in multi-state trials is generalized to cover a collection of compound patterns that must all be counted...
Donald E. K. Martin, John A. D. Aston
COMCOM
2006
194views more  COMCOM 2006»
15 years 2 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
TIP
2010
137views more  TIP 2010»
14 years 9 months ago
Adaptive Langevin Sampler for Separation of t-Distribution Modelled Astrophysical Maps
We propose to model the image differentials of astrophysical source maps by Student's t-distribution and to use them in the Bayesian source separation method as priors. We int...
Koray Kayabol, Ercan E. Kuruoglu, José Luis...