Sciweavers

1161 search results - page 116 / 233
» Group Message Authentication
Sort
View
121
Voted
ICNP
1999
IEEE
15 years 7 months ago
Concast: Design and Implementation of a New Network Service
This paper introduces concast, a new network service. Concast is the inverse of multicast: multiple sources send messages toward the same destination, which results in a single me...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...
151
Voted
PSYCHNOLOGY
2007
144views more  PSYCHNOLOGY 2007»
15 years 2 months ago
Texters not Talkers: Phone Call Aversion among Mobile Phone Users
This paper argues that there are two types of mobile phone user. The study focused on the interactional experience of mobile phone calls and text messages. The research involved 3...
Ruth Rettie
108
Voted
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 8 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
126
Voted
WETICE
1996
IEEE
15 years 6 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
129
Voted
NETWORKING
2007
15 years 4 months ago
Using PANA for Mobile IPv6 Bootstrapping
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...