Sciweavers

22 search results - page 2 / 5
» Some guidelines for non-repudiation protocols
Sort
View
SPW
2004
Springer
13 years 10 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
TON
1998
93views more  TON 1998»
13 years 4 months ago
An evaluation of flow control in group communication
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Shivakant Mishra, Lei Wu
ICMAS
1998
13 years 6 months ago
Interaction Protocols in Agentis
Agentis is a framework for building interactive multiagent applications which is based upon a model of agent interaction whose key elements are services and tasks. Central to the ...
Mark d'Inverno, David Kinny, Michael Luck
ESORICS
2007
Springer
13 years 11 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
WINET
2010
130views more  WINET 2010»
13 years 3 months ago
Performance analysis of the cumulative ARQ in IEEE 802.16 networks
In this paper, we study the performance of the cumulative Automatic Repeat reQuest (ARQ) in IEEE 802.16 networks. An analytical model is developed to investigate some important per...
Fen Hou, James She, Pin-Han Ho, Xuemin (Sherman) S...