We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Transmission Control Protocol (TCP) in the Internet Protocol suite has become over the years the most widely used protocol for data communications. Recent developments in high-spe...
The advance of wireless and mobile technology introduces a new type of Video-on-Demand (VOD) systems, namely the mobile VOD systems, that provide VOD services to mobile clients. I...
methods. If a pair of methods op1 and op2 are compatible, the summation of the quorum numbers of op1 and op2 can be smaller than the number of replicas in the QOL protocol even if ...
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...