Sciweavers

849 search results - page 47 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
113
Voted
PERCOM
2005
ACM
16 years 3 days ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...
123
Voted
CSFW
1999
IEEE
15 years 4 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
101
Voted
CCS
2001
ACM
15 years 5 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
164
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 13 days ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
112
Voted
ICMCS
2009
IEEE
128views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Seacast: A protocol for peer-to-peer video streaming supporting multiple description coding
SEACAST is a peer-to-peer live streaming protocol developed at Politecnico di Torino, which aims at improving current systems in two key areas. The first is the use of fullfledged...
Simone Zezza, Enrico Magli, Gabriella Olmo, Marco ...