Sciweavers

517 search results - page 16 / 104
» Distributed Authentication in GRID5000
Sort
View
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
15 years 1 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
ICPPW
2009
IEEE
15 years 4 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
ISCC
2002
IEEE
110views Communications» more  ISCC 2002»
15 years 2 months ago
Authenticating real time packet streams and multicasts
In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are si...
Alain Pannetrat, Refik Molva
CCS
1998
ACM
15 years 2 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
DCC
2010
IEEE
14 years 9 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson