Sciweavers

507 search results - page 33 / 102
» The relation between protocols and games
Sort
View
ACISP
2007
Springer
15 years 1 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
COORDINATION
2006
Springer
15 years 1 months ago
Atomic Commit and Negotiation in Service Oriented Computing
In this paper we investigate the relationship between two problems, related to distributed systems, that are of particular interest in the context of Service Oriented Computing: at...
Laura Bocchi, Roberto Lucchi
GLOBECOM
2009
IEEE
15 years 4 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh
FM
2008
Springer
77views Formal Methods» more  FM 2008»
14 years 11 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
CCS
2005
ACM
15 years 3 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...