Sciweavers

10 search results - page 2 / 2
» A Lightweight Formal Analysis of a Multicast Key Management ...
Sort
View
ESORICS
2006
Springer
13 years 8 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
FORMATS
2007
Springer
13 years 8 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
IJSI
2008
170views more  IJSI 2008»
13 years 4 months ago
Applying Value-Based Software Process: An ERP Example
Abstract Commercial organizations increasingly need software processes sensitive to business value, quick to apply, supportive of multi-stakeholder collaboration, and capable of ea...
LiGuo Huang, Barry W. Boehm, Hao Hu, Jian Lü,...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 4 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
ADHOCNETS
2009
Springer
13 years 7 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...