Sciweavers

2421 search results - page 431 / 485
» Message from the Editor-in-Chief
Sort
View
ICDCS
1990
IEEE
14 years 28 days ago
A Constructive Approach to the Design of Distributed Systems
The underlying model of distributed systems is that of loosely coupled components r running in parallel and communicating by message passing. Description, construction and evoluti...
Jeff Kramer, Jeff Magee, Anthony Finkelstein
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
14 years 23 days ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
GIS
2007
ACM
14 years 23 days ago
Randomization in traffic information sharing systems
In this paper, we consider a traffic information sharing system based on Floating Car Data (FCD). FCD is one of the methods used to gather traffic information; it uses vehicles as...
Masaaki Tanizaki, Ouri Wolfson
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 19 days ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
ACSAC
2001
IEEE
14 years 16 days ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner