Sciweavers

3751 search results - page 184 / 751
» Events in security protocols
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 10 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
ISCAS
2008
IEEE
101views Hardware» more  ISCAS 2008»
15 years 10 months ago
A serial communication infrastructure for multi-chip address event systems
— In recent years there have been an increasing number of research groups that have begun to develop multi-chip address-event systems. The communication protocol used to transmit...
Daniel Bernhard Fasnacht, Adrian M. Whatley, Giaco...
VALUETOOLS
2006
ACM
149views Hardware» more  VALUETOOLS 2006»
15 years 10 months ago
Tail asymptotics for discrete event systems
In the context of communication networks, the framework of stochastic event graphs allows a modeling of control mechanisms induced by the communication protocol and an analysis of ...
Marc Lelarge
CONCUR
2010
Springer
15 years 4 months ago
Conditional Automata: A Tool for Safe Removal of Negligible Events
Abstract. Polynomially accurate simulations [19] are relations for Probabilistic Automata that require transitions to be matched up to negligible sets provided that computation len...
Roberto Segala, Andrea Turrini
109
Voted
NDSS
1998
IEEE
15 years 8 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just