Sciweavers

107 search results - page 2 / 22
» An Extensible Platform for Evaluating Security Protocols
Sort
View
IEEEARES
2006
IEEE
13 years 11 months ago
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems
Distributed object systems for partitionable systems present a challenge, in that there is a trade-off between availability and consistency. Changes in one partition are not visib...
Stefan Beyer, Alexander Sanchez, Francesc D. Mu&nt...
ENTCS
2007
112views more  ENTCS 2007»
13 years 4 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
MOBIWAC
2009
ACM
13 years 11 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 5 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
IJIPT
2008
81views more  IJIPT 2008»
13 years 4 months ago
Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
: Multimedia networking in the near future is expected to be dominated by group applications such as IPTV, MMORPGs, and video conferencing. Hand in hand with new service offers, th...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...