Sciweavers

1161 search results - page 99 / 233
» Group Message Authentication
Sort
View
TCSV
2008
156views more  TCSV 2008»
15 years 21 days ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
111
Voted
SRDS
2000
IEEE
15 years 5 months ago
Optimistic Virtual Synchrony
Group communication systems are powerful building blocks that facilitate the development of fault-tolerant distributed applications. Such systems generally run in an asynchronous ...
Jeremy B. Sussman, Idit Keidar, Keith Marzullo
LCN
2003
IEEE
15 years 6 months ago
Pipelining and Overlapping for MPI Collective Operations
Collective operations are an important aspect of the currently most important message-passing programming model MPI (Message Passing Interface). Many MPI applications make heavy u...
Joachim Worringen
SCAI
2001
15 years 2 months ago
Using Situated Communication in Distributed Autonomous Mobile Robotics
When using communication in multi-robot systems it's often not desirable to choose an form of communication that separates the messages from the physical environment in which...
Kasper Støy
114
Voted
CSFW
2009
IEEE
15 years 7 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...