Sciweavers

875 search results - page 94 / 175
» On Reachability Under Uncertainty
Sort
View
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
15 years 5 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater
CONCUR
2005
Springer
15 years 5 months ago
The Individual and Collective Token Interpretations of Petri Nets
Starting from the opinion that the standard firing rule of Petri nets embodies the collective token interpretation of nets rather than their individual token interpretation, I pro...
Rob J. van Glabbeek
EUROPAR
2004
Springer
15 years 5 months ago
Improving the Scalability of Logarithmic-Degree DHT-Based Peer-to-Peer Networks
High scalability in Peer-to-Peer (P2P) systems has been achieved with the emergence of the networks based on Distributed Hash Table (DHT). Most of the DHTs can be regarded as expon...
Bruno Carton, Valentin Mesaros
LICS
2003
IEEE
15 years 5 months ago
Model checking for probability and time: from theory to practice
Probability features increasingly often in software and hardware systems: it is used in distributed co-ordination and routing problems, to model fault-tolerance and performance, a...
Marta Z. Kwiatkowska
ICCCN
1998
IEEE
15 years 4 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer