Sciweavers

1251 search results - page 212 / 251
» On the security of group communication schemes
Sort
View
ICPADS
1998
IEEE
15 years 6 months ago
Symbolic Partitioning and Scheduling of Parameterized Task Graphs
The DAG-based task graph model has been found effective in scheduling for performance prediction and optimization of parallel applications. However the scheduling complexity and s...
Michel Cosnard, Emmanuel Jeannot, Tao Yang
CN
2004
140views more  CN 2004»
15 years 1 months ago
Mobile hop-by-hop multicast routing
This work focuses on mobility management in a multicast environment. Traditional solutions, based either on bi-directional tunneling or on remote subscription, have different draw...
Rolland Vida, Luís Henrique Maciel Kosmalsk...
IACR
2011
124views more  IACR 2011»
14 years 1 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 8 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 8 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...