Sciweavers

6137 search results - page 149 / 1228
» Securing Collaborative Applications
Sort
View
TIT
2010
121views Education» more  TIT 2010»
13 years 3 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa
WETICE
2009
IEEE
14 years 3 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
WWW
2003
ACM
14 years 9 months ago
Service Chart Diagrams - Description & Application
This paper presents an approach for the design and development of service-driven applications. These applications rely on the collaboration of multiple services that businesses of...
Zakaria Maamar, Boualem Benatallah, Wathiq Mansoor
IPPS
2007
IEEE
14 years 3 months ago
A Design and Analysis of a Hybrid Multicast Transport Protocol for the Haptic Virtual Reality Tracheotomy Tele-Surgery Applicati
Nowadays, distributed collaborative virtual environments are used in many scenarios such as tele-surgery, gaming, and industrial training, However several challenging issues remai...
Azzedine Boukerche, Haifa Maamar, Abuhoss Hossain
ACISP
2005
Springer
14 years 2 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua