Sciweavers

2643 search results - page 98 / 529
» Higher order messaging
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
15 years 4 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
WEBDB
2007
Springer
112views Database» more  WEBDB 2007»
15 years 10 months ago
Value-Aware RoXSum: Effective Message Aggregation for XML-Aware Information Dissemination
Publish/subscribe (or pub/sub) systems perform asynchronous message transmission, from publishers to subscribers, without any of the parties having knowledge of the other. The pub...
Zografoula Vagena, Mirella Moura Moro, Vassilis J....
APPROX
2009
Springer
105views Algorithms» more  APPROX 2009»
15 years 2 months ago
Real-Time Message Routing and Scheduling
Abstract. Exchanging messages between nodes of a network (e.g., embedded computers) is a fundamental issue in real-time systems involving critical routing and scheduling decisions....
Ronald Koch, Britta Peis, Martin Skutella, Andreas...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
15 years 8 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
ICCCN
2008
IEEE
15 years 10 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang