Sciweavers

2421 search results - page 310 / 485
» Message from the Co-Chairs
Sort
View
ADHOCNOW
2006
Springer
14 years 4 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
CSFW
2005
IEEE
14 years 4 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICPPW
2005
IEEE
14 years 4 months ago
Load Balancing Hybrid Programming Models for SMP Clusters and Fully Permutable Loops
This paper emphasizes on load balancing issues associated with hybrid programming models for the parallelization of fully permutable nested loops onto SMP clusters. Hybrid paralle...
Nikolaos Drosinos, Nectarios Koziris
SKG
2005
IEEE
14 years 4 months ago
Building Sensor Filter Grids: Information Architecture for the Data Deluge
—We discuss a general architectural approach to knowledge and information management and delivery in distributed systems. Our approach is based on the recognition that time-stamp...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Andrea...
SRDS
2005
IEEE
14 years 4 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen