Sciweavers

1161 search results - page 168 / 233
» Group Message Authentication
Sort
View
107
Voted
JOCN
2010
95views more  JOCN 2010»
15 years 1 months ago
The Neural Correlates of Persuasion: A Common Network across Cultures and Media
■ Persuasion is at the root of countless social exchanges in which one person or group is motivated to have another share its beliefs, desires, or behavioral intentions. Here, w...
Emily B. Falk, Lian Rameson, Elliot T. Berkman, Be...
135
Voted
MHCI
2009
Springer
15 years 9 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
114
Voted
WOWMOM
2006
ACM
92views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
Inter-Regional Messenger Scheduling in Delay Tolerant Mobile Networks
The evolution of wireless devices along with the increase in user mobility have created new challenges such as network partitioning and intermittent connectivity. These new challe...
Khaled A. Harras, Kevin C. Almeroth
116
Voted
IPCCC
2005
IEEE
15 years 8 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
114
Voted
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
15 years 7 months ago
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation
Perfect Secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time a member joins or leaves the group. A Key Server must ...
Josep Pegueroles, Francisco Rico-Novella