Sciweavers

403 search results - page 72 / 81
» An algebra for commitment protocols
Sort
View
MMSYS
2012
199views more  MMSYS 2012»
13 years 7 months ago
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peerto-peer (P2P) stream distribution architecture. The use of P2P...
Raymond Sweha, Vatche Ishakian, Azer Bestavros
CCS
2007
ACM
15 years 5 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
FC
2010
Springer
169views Cryptology» more  FC 2010»
15 years 3 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 5 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
CSFW
2010
IEEE
15 years 3 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin