Sciweavers

43 search results - page 6 / 9
» A Certified Email Protocol Using Key Chains
Sort
View
EUROIMSA
2006
106views Multimedia» more  EUROIMSA 2006»
13 years 7 months ago
Plugging Presence Awareness into Mozilla Thunderbird
Presence awareness, that is the awareness of what distant colleagues are doing and their availability for interaction, plays a key role for coping with the lack of physical proxim...
Fabio Calefato, Filippo Lanubile
WPES
2004
ACM
13 years 11 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
AINA
2009
IEEE
14 years 18 days ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
IWCMC
2006
ACM
13 years 11 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
DRM
2003
Springer
13 years 11 months ago
The Darknet and the Future of Content Protection
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...