Sciweavers

38 search results - page 4 / 8
» Reflections on aspects and configurable protocols
Sort
View
EUROCRYPT
2006
Springer
13 years 10 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
MOBIHOC
2003
ACM
14 years 6 months ago
PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols
We develop a detailed approach to study how mobilityimpacts the performance of reactive MANET routing protocols. In particular we examine how the statistics of path durations inclu...
Narayanan Sadagopan, Fan Bai, Bhaskar Krishnamacha...
FORTE
2004
13 years 7 months ago
A Construction Kit for Modeling the Security of M-commerce Applications
Abstract. In this article we present a method to avoid security problems in modern m-commerce applications. The security problems that we are addressing are breaches of security du...
Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
CHARME
1997
Springer
105views Hardware» more  CHARME 1997»
13 years 10 months ago
Simulation-based verification of network protocols performance
Formal verification techniques need to deal with the complexity of the systems rified. Most often, this problem is solved by taking an abstract model of the system and aiming at a...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Pa...
CANDC
2007
ACM
13 years 10 months ago
Group creativity in virtual math teams: interactional mechanisms for referencing, remembering and bridging
In this paper, we present a qualitative case study of group creativity online in the domain of mathematics. We define creative work broadly, ranging from the micro-level coconstru...
Johann W. Sarmiento, Gerry Stahl