Sciweavers

2209 search results - page 233 / 442
» Language Based Secure Communication
Sort
View
CCS
2006
ACM
15 years 7 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
ICNP
2007
IEEE
15 years 10 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
ISI
2004
Springer
15 years 9 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
RTAS
1996
IEEE
15 years 8 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
ECOOP
1995
Springer
15 years 7 months ago
Time and Asynchrony in Interactions among Distributed Real-Time Objects
Abstract. This paper presents a framework of specification and verification for distributed real-time object-oriented systems. An earlier paper [17] introduced a process calculus...
Ichiro Satoh, Mario Tokoro