Sciweavers

2702 search results - page 34 / 541
» Message from the Editor
Sort
View
TSE
1998
112views more  TSE 1998»
13 years 7 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo
CORR
2006
Springer
94views Education» more  CORR 2006»
13 years 7 months ago
The Discrete Memoryless Multiple Access Channel with Confidential Messages
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivo...
Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Sp...
WWW
2003
ACM
14 years 8 months ago
A Unified Abstraction for Messaging on the Semantic Web
d Abstraction for Messaging on the Semantic Web Dennis Quan IBM Internet Technology 1 Rogers Street Cambridge, MA 02142 USA dennisq@us.ibm.com Karun Bakshi MIT Artificial Intellige...
Dennis Quan, Karun Bakshi, David R. Karger
PET
2004
Springer
14 years 1 months ago
Synchronous Batching: From Cascades to Free Routes
The variety of possible anonymity network topologies has spurred much debate in recent years. In a synchronous batching design, each batch of messages enters the mix network togeth...
Roger Dingledine, Vitaly Shmatikov, Paul F. Syvers...
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 7 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao