Space efficient processor identity protocol
โ Scribed by Shang-Hua Teng
- Book ID
- 103105980
- Publisher
- Elsevier Science
- Year
- 1990
- Tongue
- English
- Weight
- 693 KB
- Volume
- 34
- Category
- Article
- ISSN
- 0020-0190
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that
We present a novel user-space and transaction-oriented protocol for use in high-performance distributed computing applications. The TRAP protocol is designed to support low-latency communication in multithreaded message-passing libraries. To demonstrate the viability of TRAP, we implemented and test