Sciweavers

3751 search results - page 193 / 751
» Events in security protocols
Sort
View
CSFW
2006
IEEE
15 years 10 months ago
Resolve-Impossibility for a Contract-Signing Protocol
Abstract. A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a p...
Aybek Mukhamedov, Mark Dermot Ryan
SEC
2004
15 years 5 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
MASCOTS
2007
15 years 5 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
PIMRC
2008
IEEE
15 years 10 months ago
Dynamic data aggregation and transport in wireless sensor networks
—In wireless sensor networks, in-network aggregation is the process of compressing locally the data gathered by the sensor nodes, so that only the compressed data travel across s...
Mario O. Diaz, Kin K. Leung
TOOLS
2008
IEEE
15 years 10 months ago
Modeling of Component Environment in Presence of Callbacks and Autonomous Activities
Abstract. A popular approach to compositional verification of component-based applications is based on the assume-guarantee paradigm, where an assumption models behavior of an env...
Pavel Parizek, Frantisek Plasil