Sciweavers

212 search results - page 17 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
CSFW
1999
IEEE
15 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
SYRCODIS
2008
135views Database» more  SYRCODIS 2008»
14 years 11 months ago
Realizing Fine-Granular and Scalable Transaction Isolation in Native XML Databases
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using differ...
Sebastian Bächle, Theo Härder
91
Voted
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 4 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
IEEECIT
2010
IEEE
14 years 8 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...
96
Voted
ACTA
2005
90views more  ACTA 2005»
14 years 9 months ago
MOMI: a calculus for mobile mixins
MoMi (Mobile Mixins) is a coordination language for mobile processes that communicate and exchange object-oriented code in a distributed context. MoMi's key idea is structuri...
Lorenzo Bettini, Betti Venneri, Viviana Bono