Sciweavers

2421 search results - page 21 / 485
» Message from the Editor-in-Chief
Sort
View
EUROCRYPT
2001
Springer
14 years 3 days ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
IPPS
2000
IEEE
13 years 11 months ago
MPJ: A Proposed Java Message Passing API and Environment for High Performance Computing
In this paper we sketch out a proposed reference implementation for message passing in Java (MPJ), an MPI-like API from the Message-Passing Working Group of the Java Grande Forum ...
Mark Baker, Bryan Carpenter
WS
2006
ACM
14 years 1 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
CHI
2009
ACM
14 years 8 months ago
Social responses in mobile messaging: influence strategies, self-disclosure, and source orientation
This paper reports on a direct test of social responses to communication technologies theory (SRCT) with mobile messaging. SRCT predicts that people will mindlessly respond to com...
Attapol Thamrongrattanarit, B. J. Fogg, Claire Car...
ESSOS
2010
Springer
14 years 2 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin