Sciweavers

1161 search results - page 104 / 233
» Group Message Authentication
Sort
View
109
Voted
HIPC
2009
Springer
14 years 10 months ago
Extracting the textual and temporal structure of supercomputing logs
Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource o...
Sourabh Jain, Inderpreet Singh, Abhishek Chandra, ...
PDPTA
2008
15 years 2 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
CEAS
2005
Springer
15 years 6 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
92
Voted
INFOCOM
1999
IEEE
15 years 5 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
108
Voted
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
15 years 4 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser