Sciweavers

1161 search results - page 45 / 233
» Group Message Authentication
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
GROUP
2005
ACM
14 years 2 months ago
Instant messaging bots: accountability and peripheral participation for textual user interfaces
Over the last several years, studies of instant messaging have observed its increasing role in the workplace[1] and in social situations[2]. We propose that modifying applications...
Stephen Chan, Benjamin Hill, Sarita Yardi
WPES
2003
ACM
14 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
GROUP
2005
ACM
14 years 2 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa
OZCHI
2005
ACM
14 years 2 months ago
Supporting awareness in instant messaging: an empirical study and mechanism design
Supporting awareness plays a prominent role in facilitating natural and effective communication in Instant Messaging (IM). This paper reports our empirical study of awareness in I...
Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia