Sciweavers

2421 search results - page 9 / 485
» Message from the Co-Chairs
Sort
View
ECCC
2000
93views more  ECCC 2000»
13 years 7 months ago
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" element of a finite field Fp of p elements from rather short strings of...
Maria Isabel Gonzalez Vasco, Igor Shparlinski
TSE
1998
112views more  TSE 1998»
13 years 7 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo
CORR
2006
Springer
94views Education» more  CORR 2006»
13 years 7 months ago
The Discrete Memoryless Multiple Access Channel with Confidential Messages
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivo...
Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Sp...
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 7 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
PVM
1999
Springer
13 years 12 months ago
A Standard Interface for Debugger Access to Message Queue Information in MPI
This paper discusses the design and implementation of an interface that allows a debugger to obtain the information necessary to display the contents of the MPI message queues. The...
James Cownie, William Gropp