Sciweavers

234 search results - page 25 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
ACMSE
2007
ACM
13 years 11 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
EUROCRYPT
1997
Springer
13 years 12 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
EUROMICRO
2002
IEEE
14 years 22 days ago
Feasibility Analysis for Web Project Engineering Encoded as Rule-Based Expert System
The initial steps in carrying out a feasibility analysis for a web project, based on information obtained interactively from a prospective client, are modelled as a rulebased expe...
Pablo Gervás, Juan José Escribano Ot...
AAAIDEA
2005
IEEE
14 years 1 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
UM
2001
Springer
14 years 6 days ago
Modeling Literary Style for Semi-automatic Generation of Poetry
Abstract. The generation of formal poetry involves both complex creativity usually exercised by a human poet - and strict algorithmic restrictions regarding the metrical structure ...
Pablo Gervás