Sciweavers

1161 search results - page 64 / 233
» Group Message Authentication
Sort
View
104
Voted
WETICE
2009
IEEE
15 years 7 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
105
Voted
IWC
2010
86views more  IWC 2010»
14 years 11 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
GROUP
2005
ACM
15 years 6 months ago
Broadcasting information via display names in instant messaging
Many instant messenger (IM) clients let a person specify the identifying name that appears in another person’s contact list. We have noticed that many people add extra informati...
Stephanie Smale, Saul Greenberg
94
Voted
EUC
2006
Springer
15 years 4 months ago
Scalable Message Routing for Mobile Software Assistants
In this paper we define an algorithm for location-independent communication of mobile software Personal Assistants (PAs). The algorithm extends the Query Server with Caching algor...
Pawel T. Wojciechowski
126
Voted
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner