This document describes an implementation of secure communication for distributed applications in Ada 95. It explains the basics of cryptography and introduces the problem of key exchange. After a brief description of distributed systems in Ada 95, the modular structure of the implementation and the way it handles key distribution is presented
A distributed security architecture is proposed for incorporation into group oriented distributed s...
The problem of secure key distribution has been the subject of much attention in the recent years. T...
Abstract-Knowledge exchange and information access in a truly dis-tributed network often require tra...
In this paper we present a project to provide fault tolerance in distributed Ada 95 application by m...
This paper extends the conceptual model of the "STONEMAN" document to more completely model the inte...
In recent years, the field of distributed processing, distributed systems, has undergone great chang...
Michigan is currently developing a real-time distributed computing capability based upon the premise...
Data encryption (cryptography) is utilized in various applications and environments. The specific ut...
Abstract — Now a day’s providing security for messages in group communication is more essential and ...
From the smallest microcomputer to the largest mainframe computer, data communication capabilities a...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
This book provides an introduction to distributed programming abstractions and presents the fundamen...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
Many services in a distributed public network - like the Internet - require secure communications. S...
Recent evolutions in computer networks have made it possible to consider distributed platforms as po...
A distributed security architecture is proposed for incorporation into group oriented distributed s...
The problem of secure key distribution has been the subject of much attention in the recent years. T...
Abstract-Knowledge exchange and information access in a truly dis-tributed network often require tra...
In this paper we present a project to provide fault tolerance in distributed Ada 95 application by m...
This paper extends the conceptual model of the "STONEMAN" document to more completely model the inte...
In recent years, the field of distributed processing, distributed systems, has undergone great chang...
Michigan is currently developing a real-time distributed computing capability based upon the premise...
Data encryption (cryptography) is utilized in various applications and environments. The specific ut...
Abstract — Now a day’s providing security for messages in group communication is more essential and ...
From the smallest microcomputer to the largest mainframe computer, data communication capabilities a...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
This book provides an introduction to distributed programming abstractions and presents the fundamen...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
Many services in a distributed public network - like the Internet - require secure communications. S...
Recent evolutions in computer networks have made it possible to consider distributed platforms as po...
A distributed security architecture is proposed for incorporation into group oriented distributed s...
The problem of secure key distribution has been the subject of much attention in the recent years. T...
Abstract-Knowledge exchange and information access in a truly dis-tributed network often require tra...