Sciweavers

2478 search results - page 339 / 496
» Message from the Chair
Sort
View
101
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 24 days ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
106
Voted
CN
2007
115views more  CN 2007»
15 years 23 days ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi
97
Voted
IJHPCN
2006
106views more  IJHPCN 2006»
15 years 23 days ago
Performance evaluation of the Sun Fire Link SMP clusters
As symmetric multiprocessors become commonplace, the interconnection networks and the communication system software in clusters of multiprocessors become critical to achieving high...
Ying Qian, Ahmad Afsahi, Nathan R. Fredrickson, Re...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 23 days ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
113
Voted
INTERNET
2006
156views more  INTERNET 2006»
15 years 23 days ago
Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management
Web services provide abstractions for simplifying integration at lower levels of the interaction stacks, they don't yet help simplify integration at higher abstraction levels ...
Boualem Benatallah, Fabio Casati, Farouk Toumani, ...