Sciweavers

1638 search results - page 299 / 328
» Properties of input-consuming derivations
Sort
View
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 3 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...
IMC
2004
ACM
15 years 3 months ago
Single-hop probing asymptotics in available bandwidth estimation: sample-path analysis
In this paper, we take the sample-path approach in analyzing the asymptotic behavior of single-hop bandwidth estimation under bursty cross-traffic and show that these results are ...
Xiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu...
WOSP
2004
ACM
15 years 3 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
ACOM
2004
Springer
15 years 3 months ago
Formulating Agent Communication Semantics and Pragmatics as Behavioral Expectations
Abstract. Although several approaches to the semantics of agent communication have been proposed, none of them is really suitable for dealing with agent autonomy, which is a decisi...
Matthias Nickles, Michael Rovatsos, Gerhard Wei&sz...
AES
2004
Springer
135views Cryptology» more  AES 2004»
15 years 3 months ago
Some Algebraic Aspects of the Advanced Encryption Standard
Abstract. Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously eva...
Carlos Cid