Sciweavers

256 search results - page 5 / 52
» Exchanging messages of different sizes
Sort
View
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
EUROPAR
2000
Springer
13 years 11 months ago
Impact of PE Mapping on Cray T3E Message-Passing Performance
The aim of this paper is to study the influence of processor mapping on message passing performance of two different parallel computers: the Cray T3E and the SGI Origin 2000. For t...
Eduardo Huedo, Manuel Prieto, Ignacio Martí...
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
IM
2007
13 years 7 months ago
A Service Middleware that Scales in System Size and Applications
We present a peer-to-peer service management middleware that dynamically allocates system resources to a large set of applications. The system achieves scalability in number of no...
Constantin Adam, Rolf Stadler, Chunqiang Tang, Mal...
SERVICES
2010
128views more  SERVICES 2010»
13 years 8 months ago
Size Matters!? Measuring the Complexity of XML Schema Mapping Models
Abstract--Exchanging structured business documents is inevitable for successful collaboration in electronic commerce. A prerequisite, for fostering the interoperability between bus...
Christian Pichler, Michael Strommer, Christian Hue...