Sciweavers

3275 search results - page 176 / 655
» Issues in Communication Game
Sort
View
138
Voted
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
165
Voted
ELPUB
2003
ACM
15 years 10 months ago
The Diversity of Trends, Experiences and Approaches in Electronic Publishing: Evidences of a Paradigm Shift on Communication
Electronic publishing constitutes one of the most exciting themes nowadays, amongst academics, at least, though substantial effects of IT usage for communication purposes in other...
Sely Maria de Souza Costa, Ana Cristina Moreira
FOCS
2002
IEEE
15 years 10 months ago
Protocols and Impossibility Results for Gossip-Based Communication Mechanisms
In recent years, gossip-based algorithms have gained prominence as a methodology for designing robust and scalable communication schemes in large distributed systems. The premise ...
David Kempe, Jon M. Kleinberg
SIGCOMM
1998
ACM
15 years 9 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
172
Voted
CLUSTER
2008
IEEE
15 years 6 months ago
Efficient one-copy MPI shared memory communication in Virtual Machines
Efficient intra-node shared memory communication is important for High Performance Computing (HPC), especially with the emergence of multi-core architectures. As clusters continue ...
Wei Huang, Matthew J. Koop, Dhabaleswar K. Panda