Sciweavers

47 search results - page 2 / 10
» Analysis of the HIP Base Exchange Protocol
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 days ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
JNW
2008
177views more  JNW 2008»
13 years 5 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
MICCAI
2004
Springer
14 years 6 months ago
Bone Motion Analysis from Dynamic MRI: Acquisition and Tracking
For diagnosis, preoperative planning and postoperative guides, an accurate estimate of joints kinematics is required. We bring together MRI developments and new image processing me...
Benjamin Gilles, Rosalind Perrin, Nadia Magnenat-T...
CSFW
2005
IEEE
13 years 11 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
FCT
2003
Springer
13 years 10 months ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi