Sciweavers

2421 search results - page 89 / 485
» Message from the Editor-in-Chief
Sort
View
ISW
2009
Springer
14 years 4 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
PAM
2007
Springer
14 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
BROADNETS
2006
IEEE
14 years 4 months ago
Optimizing IP Multicast through Delayed Multicast Tree Pruning
This paper studies the system parameters that affect the total cost of managing the multicast group on a router. A Petri net model is first proposed to describe the states and tra...
Yongjun Li, Wenhui Zhou, James Zijun Wang, Deyu Qi
CCECE
2006
IEEE
14 years 4 months ago
A Demand-Driven Approach for a Distributed Virtual Environment
The relevance of distributed virtual environments (DVE) and interactive 3D worlds for entertaining and commercial purposes is steadily increasing. DVEs are typically implemented a...
Markus Fakler, Stefan Frenz, Michael Schöttne...
COCO
2004
Springer
104views Algorithms» more  COCO 2004»
14 years 3 months ago
Quantum Arthur-Merlin Games
This paper studies quantum Arthur–Merlin games, which are Arthur–Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum in...
Chris Marriott, John Watrous