Sciweavers

49 search results - page 10 / 10
» Model-Based Testing of Cryptographic Protocols
Sort
View
ICPP
2002
IEEE
13 years 11 months ago
EMPOWER: A Scalable Framework for Network Emulation
The development and implementation of new network protocols and applications need accurate, scalable, reconfigurable, and inexpensive tools for debugging, testing, performance tun...
Pei Zheng, Lionel M. Ni
EUROCRYPT
2008
Springer
13 years 7 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
STOC
2007
ACM
111views Algorithms» more  STOC 2007»
14 years 6 months ago
Low-end uniform hardness vs. randomness tradeoffs for AM
In 1998, Impagliazzo and Wigderson [IW98] proved a hardness vs. randomness tradeoff for BPP in the uniform setting, which was subsequently extended to give optimal tradeoffs for t...
Ronen Shaltiel, Christopher Umans
TON
2010
93views more  TON 2010»
13 years 19 days ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone