Sciweavers

403 search results - page 48 / 81
» An algebra for commitment protocols
Sort
View
APLAS
2007
ACM
15 years 3 months ago
Timed, Distributed, Probabilistic, Typed Processes
This paper studies types and probabilistic bisimulations for a timed -calculus as an effective tool for a compositional analysis of probabilistic distributed behaviour. The types c...
Martin Berger, Nobuko Yoshida
HPN
1992
15 years 1 months ago
Client-Network Interactions in Quality of Service Communication Environments
Multimediacommunication,with its strong requirementsfor high speed, assured quality, and reliable networking, is stimulating a great research e ort towards the development of real...
Domenico Ferrari, Jean Ramaekers, Giorgio Ventre
CORR
2007
Springer
115views Education» more  CORR 2007»
14 years 11 months ago
Random Linear Network Coding: A free cipher?
Abstract— We consider the level of information security provided by random linear network coding in network scenarios in which all nodes comply with the communication protocols y...
Luísa Lima, Muriel Médard, Joã...
CSFW
2005
IEEE
15 years 5 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
LICS
2006
IEEE
15 years 5 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon