Sciweavers

1878 search results - page 340 / 376
» Efficient Performance Models in Component-Based Software Eng...
Sort
View
FSTTCS
2003
Springer
15 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
CCS
2008
ACM
14 years 11 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
TCOM
2010
98views more  TCOM 2010»
14 years 4 months ago
Convolutionally Coded Transmission over Markov-Gaussian Channels: Analysis and Decoding Metrics
It has been widely acknowledged that the aggregate interference at the receiver for various practical communication channels can often deviate markedly from the classical additive ...
Jeebak Mitra, Lutz H.-J. Lampe
TCOM
2010
162views more  TCOM 2010»
14 years 4 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
CHI
2007
ACM
15 years 10 months ago
Meta-analysis of correlations among usability measures
Understanding the relation between usability measures seems crucial to deepen our conception of usability and to select the right measures for usability studies. We present a meta...
Kasper Hornbæk, Effie Lai-Chong Law