Sciweavers

719 search results - page 61 / 144
» Proving Security Protocols Correct
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 4 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
ICCSA
2007
Springer
15 years 3 months ago
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al....
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
DCOSS
2005
Springer
15 years 3 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
ICTAI
1997
IEEE
15 years 1 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
WAIM
2010
Springer
14 years 8 months ago
V Locking Protocol for Materialized Aggregate Join Views on B-Tree Indices
Immediate materialized view maintenance with transactional consistency is highly desirable to support real-time decision making. Nevertheless, due to high deadlock rates, such main...
Gang Luo