Sciweavers

3483 search results - page 26 / 697
» Forward
Sort
View
INFOCOM
2011
IEEE
14 years 27 days ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...
TMC
2012
12 years 12 months ago
Trajectory-Based Statistical Forwarding for Multihop Infrastructure-to-Vehicle Data Delivery
—This paper proposes Trajectory-based Statistical Forwarding (TSF) scheme, tailored for the multihop data delivery from infrastructure nodes (e.g., Internet access points) to mov...
Jaehoon (Paul) Jeong, Shuo Guo, Yu (Jason) Gu, Tia...
82
Voted
ESORICS
2012
Springer
12 years 12 months ago
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extend...
Cas J. F. Cremers, Michele Feltz
ICALP
2009
Springer
15 years 9 months ago
Forward Analysis for WSTS, Part II: Complete WSTS
Abstract. We describe a simple, conceptual forward analysis procedure for complete WSTS S. This computes the clover of a state s0, i.e., a finite description of the closure of the ...
Alain Finkel, Jean Goubault-Larrecq
RP
2009
Springer
124views Control Systems» more  RP 2009»
15 years 4 months ago
Forward Analysis of Dynamic Network of Pushdown Systems Is Easier without Order
Dynamic networks of Pushdown Systems (PDN in short) have been introduced to perform static analysis of concurrent programs that may spawn threads dynamically. In this model the se...
Denis Lugiez