Sciweavers

1513 search results - page 9 / 303
» Fibonacci Correction Networks
Sort
View
CSFW
2008
IEEE
14 years 11 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
CDC
2010
IEEE
173views Control Systems» more  CDC 2010»
14 years 4 months ago
Corrective consensus: Converging to the exact average
Consensus algorithms provide an elegant distributed way for computing the average of a set of measurements across a sensor network. However, the convergence of the node estimates t...
Yin Chen, Roberto Tron, Andreas Terzis, René...
94
Voted
POLICY
2001
Springer
15 years 1 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
FM
1999
Springer
126views Formal Methods» more  FM 1999»
15 years 1 months ago
Correctness Proof of the Standardized Algorithm for ABR Conformance
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always agree with a well d...
Jean-François Monin, Francis Klay
100
Voted
EUROCRYPT
2007
Springer
15 years 3 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...