Sciweavers

7 search results - page 1 / 2
» New (Two-Track-)MAC Based on the Two Trails of RIPEMD
Sort
View
SACRYPT
2001
Springer
136views Cryptology» more  SACRYPT 2001»
13 years 9 months ago
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC ba...
Bert den Boer, Bart Van Rompay, Bart Preneel, Joos...
HCI
2009
13 years 2 months ago
Trail Patterns in Social Tagging Systems: Role of Tags as Digital Pheromones
The popularity of social information systems has been driven by their ability to help users manage, organize and share online resources. Though the research exploring the use of ta...
Thomas George Kannampallil, Wai-Tat Fu
NDSS
2003
IEEE
13 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
ICPP
2005
IEEE
13 years 10 months ago
An ACO-Based Approach for Scheduling Task Graphs with Communication Costs
In this paper we introduce a new algorithm for computing near optimal schedules for task graph problems. In contrast to conventional approaches for solving those scheduling proble...
Markus Bank, Udo Hönig, Wolfram Schiffmann
TRIDENTCOM
2006
IEEE
13 years 11 months ago
A testbed demonstrating optical IP switching (OIS) in disaggregated network architectures
: The lack of a unified control plane does not allow current optical networks to dynamically provision new optical paths. The IETF standardization body has proposed the Generalized...
Marco Ruffini, Donal O'Mahony, Linda Doyle