Sciweavers

1161 search results - page 77 / 233
» Group Message Authentication
Sort
View
143
Voted
DEXAW
1998
IEEE
160views Database» more  DEXAW 1998»
15 years 5 months ago
Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
Juha Takkinen, Nahid Shahmehri
ICDCSW
2005
IEEE
15 years 6 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
87
Voted
ICS
2005
Tsinghua U.
15 years 6 months ago
Parallel sparse LU factorization on second-class message passing platforms
Several message passing-based parallel solvers have been developed for general (non-symmetric) sparse LU factorization with partial pivoting. Due to the fine-grain synchronizatio...
Kai Shen
123
Voted
PAMI
2007
97views more  PAMI 2007»
15 years 7 days ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell
AMC
2005
147views more  AMC 2005»
15 years 20 days ago
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
Hwang and Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authorized proxy signers to sign messages on behalf of a group of original signers. ...
Yuh-Dauh Lyuu, Ming-Luen Wu