Sciweavers

1161 search results - page 172 / 233
» Group Message Authentication
Sort
View
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
13 years 2 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
CHI
2007
ACM
16 years 8 days ago
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
Jennifer Thom-Santelli, Alex Ainslie, Geri Gay
CHI
2006
ACM
16 years 8 days ago
No IM please, : we're testing
This paper discusses the use of instant messaging (IM) as a communication tool during usability studies ? primarily between the interview and observation rooms. The benefits and c...
Richard Boardman
PETRA
2009
ACM
15 years 6 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
102
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 6 months ago
Achievable Diversity-Multiplexing-Delay Tradeoff for ARQ Cooperative Broadcast Channels
—Cooperative broadcast aims to deliver common messages to all receiver nodes in the wireless network by utilizing cooperation between them. This can have many important applicati...
Lingfan Weng, Ross D. Murch