Sciweavers

142 search results - page 21 / 29
» Protocol Algebra
Sort
View
PEWASUN
2006
ACM
15 years 4 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
ICICS
2004
Springer
15 years 3 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
15 years 2 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 2 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
COORDINATION
2000
Springer
15 years 1 months ago
GCCS: A Graphical Coordination Language for System Specification
Abstract. We present GCCS, a graphical coordination language for hierarchical concurrent systems. GCCS, which is implemented in the Concurrency Factory design environment, represen...
Rance Cleaveland, Xiaoqun Du, Scott A. Smolka