Sciweavers

2478 search results - page 154 / 496
» Message from the Chair
Sort
View
SIROCCO
1998
15 years 6 months ago
Time and Bit Optimal Broadcasting on Anonymous Unoriented Hypercubes
We consider broadcasting on asynchronous anonymous totally unoriented Nnode hypercubes. First we generalize a technique, introduced in 3 , for partial broadcasting and orientation...
Stefan Dobrev, Peter Ruzicka, Gerard Tel
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 4 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
IJKL
2007
90views more  IJKL 2007»
15 years 4 months ago
Semantics-supported cooperative learning for enhanced awareness
: Awareness is required for supporting all forms of cooperation. In Computer Supported Collaborative Learning (CSCL), awareness can be used for enhancing collaborative opportunitie...
César A. Collazos, Roberto Garcia
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 4 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
15 years 4 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu