Sciweavers

1161 search results - page 84 / 233
» Group Message Authentication
Sort
View
ICCSA
2005
Springer
15 years 6 months ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
92
Voted
IJNSEC
2006
110views more  IJNSEC 2006»
15 years 22 days ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
137
Voted
ICPADS
2010
IEEE
14 years 10 months ago
GMH: A Message Passing Toolkit for GPU Clusters
Driven by the market demand for high-definition 3D graphics, commodity graphics processing units (GPUs) have evolved into highly parallel, multi-threaded, many-core processors, whi...
Jie Chen, William A. Watson III, Weizhen Mao
MUM
2009
ACM
198views Multimedia» more  MUM 2009»
15 years 7 months ago
Context-aware messaging: how personal, spatial and temporal constraints affect text-based communication
There are academic and commercial drivers for contextawareness to play a prominent role in the future of mobile services. Implementing a complete model of context remains an unsol...
Simon Jones, Eamonn O'Neill
103
Voted
CSCW
2006
ACM
15 years 6 months ago
HomeNote: supporting situated messaging in the home
In this paper we describe a field trial designed to investigate the potential of remote, situated messaging within the home. Five households used our “HomeNote” device for app...
Abigail Sellen, Richard H. R. Harper, Rachel Eardl...