Sciweavers

1362 search results - page 105 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
140
Voted
CN
2007
77views more  CN 2007»
15 years 3 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
136
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
125
Voted
ICDCSW
2009
IEEE
15 years 1 months ago
Performance Analysis of WiMedia UWB MAC
Ultra Wide Band (UWB) technologies have attracted a lot of attention recently due to their large bandwidth and low emission, which are suitable for in-door, high-speed multimedia c...
Rukhsana Ruby, Jianping Pan
146
Voted
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 4 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
160
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Finding bugs efficiently with a SAT solver
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
Julian Dolby, Mandana Vaziri, Frank Tip