Sciweavers

8 search results - page 1 / 2
» Key Grids: A Protocol Family for Assigning Symmetric Keys
Sort
View
ICNP
2006
IEEE
13 years 10 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 4 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
ICS
1999
Tsinghua U.
13 years 9 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
ACSAC
2009
IEEE
13 years 11 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
IJHPCA
2008
151views more  IJHPCA 2008»
13 years 4 months ago
WE-AMBLE: a Workflow Engine To Manage Awareness in Collaborative Grid Environments
Grid computing intends to share heterogeneous resources in dynamic service-based environments. This kind of systems has the major advantages of enabling rapid composition of distr...
Pilar Herrero, José Luis Bosque, Manuel Sal...