Sciweavers

1161 search results - page 186 / 233
» Group Message Authentication
Sort
View
ICOIN
2005
Springer
14 years 3 months ago
Decreasing Mobile IPv6 Signaling with XCAST
Abstract. Mobile IPv6 is the IETF proposition to support host mobility in the Internet. It provides routing optimization for packets sent to the mobile node at the expense of signa...
Thierry Ernst
DBISP2P
2003
Springer
113views Database» more  DBISP2P 2003»
14 years 3 months ago
Structuring Peer-to-Peer Networks Using Interest-Based Communities
Abstract. Interest-based communities are a natural arrangement of distributed systems that prune the search space and allow for better dissemination of information to participating...
Mujtaba Khambatti, Kyung Dong Ryu, Partha Dasgupta
UM
2001
Springer
14 years 2 months ago
Modeling Literary Style for Semi-automatic Generation of Poetry
Abstract. The generation of formal poetry involves both complex creativity usually exercised by a human poet - and strict algorithmic restrictions regarding the metrical structure ...
Pablo Gervás
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
ACSC
2007
IEEE
14 years 2 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...