Sciweavers

2421 search results - page 21 / 485
» Message from the Editor-in-Chief
Sort
View
EUROCRYPT
2001
Springer
15 years 2 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
71
Voted
IPPS
2000
IEEE
15 years 1 months ago
MPJ: A Proposed Java Message Passing API and Environment for High Performance Computing
In this paper we sketch out a proposed reference implementation for message passing in Java (MPJ), an MPI-like API from the Message-Passing Working Group of the Java Grande Forum ...
Mark Baker, Bryan Carpenter
WS
2006
ACM
15 years 3 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
54
Voted
CHI
2009
ACM
15 years 10 months ago
Social responses in mobile messaging: influence strategies, self-disclosure, and source orientation
This paper reports on a direct test of social responses to communication technologies theory (SRCT) with mobile messaging. SRCT predicts that people will mindlessly respond to com...
Attapol Thamrongrattanarit, B. J. Fogg, Claire Car...
64
Voted
ESSOS
2010
Springer
15 years 4 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin