We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Abstract-- Network management and operations are complicated, tedious, and error-prone, requiring significant human involvement and domain knowledge. As the complexity involved ine...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
— Given two versions of a file, a current version located on one machine and an outdated version known only to another machine, the remote file synchronization problem is how t...
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...