Sciweavers

1490 search results - page 173 / 298
» The Logic of Authentication Protocols
Sort
View
FOCS
2000
IEEE
15 years 5 months ago
Zaps and Their Applications
A zap is a two-round, public coin witness-indistinguishable protocol in which the first round, consisting of a message from the verifier to the prover, can be fixed “once and...
Cynthia Dwork, Moni Naor
ACIIDS
2009
IEEE
89views Database» more  ACIIDS 2009»
15 years 4 months ago
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes
Inter domain service routing is an element in the success of Next Generation Network. Service requests, such as the INVITE request in Session Initiation Protocol [21] may need to ...
David Lai, Zhongwei Zhang
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 4 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
103
Voted
IWCMC
2006
ACM
15 years 6 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
113
Voted
ICCAD
1994
IEEE
127views Hardware» more  ICCAD 1994»
15 years 4 months ago
Synthesis of concurrent system interface modules with automatic protocol conversion generation
-- We describe a new high-level compiler called Integral fordesigning system interface modules. The inputis a high-levelconcurrent algorithmic specification that can model complex ...
Bill Lin, Steven Vercauteren