Sciweavers

1161 search results - page 85 / 233
» Group Message Authentication
Sort
View
89
Voted
CSCW
2004
ACM
15 years 6 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 7 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
ICPP
2002
IEEE
15 years 5 months ago
Region Synchronization in Message Passing Systems
The development of correct synchronization code for distributed programs is a challenging task. In this paper, we propose an aspect oriented technique for developing synchronizati...
Gurdip Singh, Ye Su
89
Voted
DFN
2003
15 years 2 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
CHI
2004
ACM
16 years 1 months ago
IM here: public instant messaging on large, shared displays for workgroup interactions
Instant messaging (IM) in the workplace has proven to be a valuable tool for facilitating informal communication. Its benefits, however, are generally limited to times when users ...
Elaine M. Huang, Daniel M. Russell, Alison E. Sue