Sciweavers

1161 search results - page 88 / 233
» Group Message Authentication
Sort
View
CSCW
2002
ACM
15 years 17 days ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 4 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 10 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
98
Voted
HUC
2004
Springer
15 years 6 months ago
WatchMe: Communication and Awareness Between Members of a Closely-Knit Group
WatchMe is a personal communicator with context awareness in a wristwatch form; it is meant to keep intimate friends and family always connected via awareness cues and text, voice ...
Natalia Marmasse, Chris Schmandt, David Spectre
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...