Sciweavers

375 search results - page 74 / 75
» What is Correctness of Security Protocols
Sort
View
ICALP
2010
Springer
13 years 10 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
SOSP
2007
ACM
14 years 2 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
WPES
2004
ACM
13 years 11 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
IPSN
2005
Springer
13 years 11 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
PIMRC
2008
IEEE
14 years 4 days ago
Performance evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H streaming services
—This article studies the performance of the Sliding RS Encoding (SRSE) in the transmission of streaming services in DVB-H (Digital Video Broadcasting - Transmission System for H...
David Gozalvez, David Gomez-Barquero, Narcis Cardo...