Sciweavers

905 search results - page 22 / 181
» Public key distribution through
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
CCGRID
2005
IEEE
14 years 1 months ago
Secret sequence comparison on public grid computing resources
Once a new gene has been sequenced, it must be verified whether or not it is similar to previously sequenced genes. In many cases, the organization that sequenced a potentially n...
Ken-ichi Kurata, Hiroshi Nakamura, Vincent Breton
UIST
2003
ACM
14 years 22 days ago
Classroom BRIDGE: using collaborative public and desktop timelines to support activity awareness
Classroom BRIDGE supports activity awareness by facilitating planning and goal revision in collaborative, project-based middle school science. It integrates largescreen and deskto...
Craig H. Ganoe, Jacob P. Somervell, Dennis C. Neal...
CSDA
2010
173views more  CSDA 2010»
13 years 7 months ago
Time-varying joint distribution through copulas
This paper deals with the analysis of temporal dependence in multivariate highfrequency time series data. The dependence structure between the marginal series is modelled through ...
M. Concepcion Ausin, Hedibert F. Lopes
INFOCOM
1998
IEEE
13 years 11 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai