Sciweavers

7329 search results - page 358 / 1466
» Network Extractor Protocols
Sort
View
ICDCN
2009
Springer
15 years 11 months ago
Self-similar Functions and Population Protocols: A Characterization and a Comparison
Chandy et al. proposed the methodology of “self-similar algorithms” for distributed computation in dynamic environments. We further characterize the class of functions computab...
Swapnil Bhatia, Radim Bartos
133
Voted
POLICY
2007
Springer
15 years 11 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
NORDSEC
2009
Springer
15 years 9 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
PERCOM
2006
ACM
16 years 4 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...