Sciweavers

1161 search results - page 201 / 233
» Group Message Authentication
Sort
View
CHI
2005
ACM
14 years 8 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
ASIACRYPT
2003
Springer
14 years 29 days ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
PERCOM
2008
ACM
13 years 7 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
TOCS
1998
114views more  TOCS 1998»
13 years 7 months ago
Performance Evaluation of the Orca Shared-Object System
Orca is a portable, object-based distributed shared memory system. This paper studies and evaluates the design choices made in the Orca system and compares Orca with other DSMs. T...
Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman...
REPLICATION
2010
13 years 6 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman