Sciweavers

729 search results - page 51 / 146
» Where is multicast today
Sort
View
CRYPTO
2004
Springer
97views Cryptology» more  CRYPTO 2004»
14 years 15 days ago
Efficient Tree-Based Revocation in Groups of Low-State Devices
Abstract. We study the problem of broadcasting confidential information to a collection of n devices while providing the ability to revoke an arbitrary subset of those devices (and...
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tama...
ASIACRYPT
2001
Springer
14 years 13 days ago
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
Dynamic group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parti...
Emmanuel Bresson, Olivier Chevassut, David Pointch...
HCW
2000
IEEE
14 years 1 months ago
Fast Heterogeneous Binary Data Interchange
Dramatic increasesin availablewide-area bandwidth have driven event-basedmonitoring to new heights. Monitoring services are widely used in today's distributed laboratories, w...
Greg Eisenhauer, Lynn K. Daley
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
14 years 20 days ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
CONCUR
2009
Springer
14 years 3 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka