Sciweavers

256 search results - page 32 / 52
» Reusing Static Keys in Key Agreement Protocols
Sort
View
WIMOB
2008
IEEE
15 years 8 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
ISOLA
2010
Springer
15 years 5 days ago
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agree...
Anders P. Ravn, Jirí Srba, Saleem Vighio
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 7 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
IWSOS
2007
Springer
15 years 7 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
PPSC
1997
15 years 3 months ago
Dynamic Load-Balancing for Parallel Adaptive Unstructured Meshes
A parallel method for dynamic partitioning of unstructured meshes is described. The method employs a new iterative optimisation technique which both balances the workload and atte...
Chris Walshaw, Mark Cross, M. G. Everett