Sciweavers

4305 search results - page 544 / 861
» Analysing Protocol Implementations
Sort
View
125
Voted
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 9 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
147
Voted
INFOCOM
1999
IEEE
15 years 9 months ago
Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...
John W. Byers, Michael Luby, Michael Mitzenmacher
INFOCOM
1999
IEEE
15 years 9 months ago
A Model for Window Based Flow Control in Packet-Switched Networks
Recently, networks have increased rapidly both in scale and speed. Problems related to the control and management are of increasing interest. The average throughput and end-to-end ...
Xiaowei Yang
LICS
1999
IEEE
15 years 9 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese