Sciweavers

2643 search results - page 164 / 529
» Higher order messaging
Sort
View
FSE
2004
Springer
167views Cryptology» more  FSE 2004»
15 years 10 months ago
Nonce-Based Symmetric Encryption
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function E of the message M and the key K: the user su...
Phillip Rogaway
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 10 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
IPSN
2003
Springer
15 years 10 months ago
Mobicast: Just-in-Time Multicast for Sensor Networks under Spatiotemporal Constraints
This paper is concerned with coordinated delivery of messages in sensor networks. The notion of multicast is re-examined in light of a new set of requirements that are specific t...
Qingfeng Huang, Chenyang Lu, Gruia-Catalin Roman
SRDS
2000
IEEE
15 years 9 months ago
Optimistic Virtual Synchrony
Group communication systems are powerful building blocks that facilitate the development of fault-tolerant distributed applications. Such systems generally run in an asynchronous ...
Jeremy B. Sussman, Idit Keidar, Keith Marzullo
ICTAI
1999
IEEE
15 years 9 months ago
Dynamic Email Organization via Relevance Categories
Many researchers have proposed classification systems that automatically classify email in order to reduce information overload. However, none of these systems are in use today. T...
Kenrick J. Mock