Sciweavers

278 search results - page 7 / 56
» Variants of Spreading Messages
Sort
View
ACSAC
2009
IEEE
13 years 11 months ago
RAD: Reflector Attack Defense Using Message Authentication Codes
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 1 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang
ESWS
2008
Springer
13 years 9 months ago
Combining Fact and Document Retrieval with Spreading Activation for Semantic Desktop Search
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
Kinga Schumacher, Michael Sintek, Leo Sauermann
SERVICES
2008
106views more  SERVICES 2008»
13 years 9 months ago
Distributed Simulation and Web Map Mash-Up for Forest Fire Spread
The emergence of recent XML-based technologies paved the way for new types of architectures and message exchanges on the Internet through Web services. MashUps consist in combinin...
Yosri Harzallah, Vincent Michel, Qi Liu, Gabriel A...
ASIACRYPT
2005
Springer
14 years 1 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...