Sciweavers

719 search results - page 50 / 144
» Proving Security Protocols Correct
Sort
View
WDAG
2004
Springer
122views Algorithms» more  WDAG 2004»
15 years 3 months ago
Active and Concurrent Topology Maintenance
A central problem for structured peer-to-peer networks is topology maintenance, that is, how to properly update neighbor variables when nodes join and leave the network, possibly c...
Xiaozhou Li, Jayadev Misra, C. Greg Plaxton
ICDCS
2007
IEEE
15 years 4 months ago
Protocol Design for Dynamic Delaunay Triangulation
Delaunay triangulation (DT) is a useful geometric structure for networking applications. In this paper we investigate the design of join, leave, and maintenance protocols to const...
Dong-Young Lee, Simon S. Lam
CCS
2008
ACM
14 years 11 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
IFIPTM
2010
139views Management» more  IFIPTM 2010»
14 years 8 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
ACISP
2009
Springer
15 years 4 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu