Sciweavers

634 search results - page 29 / 127
» Groundwork for Weak Analysis
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 8 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
HYBRID
2007
Springer
15 years 8 months ago
Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems
This work investigates some of the computational issues involved in the solution of probabilistic reachability problems for discretetime, controlled stochastic hybrid systems. It i...
Alessandro Abate, Saurabh Amin, Maria Prandini, Jo...
ICCSA
2005
Springer
15 years 7 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IWPC
2002
IEEE
15 years 6 months ago
Theory-based Analysis of Cognitive Support in Software Comprehension Tools
Past research on software comprehension tools has produced a wealth of lessons in building good tools. However our explanations of these tools tends to be weakly grounded in exist...
Andrew Walenstein
LCN
2002
IEEE
15 years 6 months ago
Multicast Performance Analysis for High-Speed Torus Networks
Overall efficiency of high-performance computing clusters not only relies on the computing power of the individual nodes, but also on the performance that the underlying network c...
Sarp Oral, Alan D. George