Sciweavers

507 search results - page 71 / 102
» The relation between protocols and games
Sort
View
CIKM
2009
Springer
15 years 4 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
CONEXT
2006
ACM
15 years 3 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
CBSE
2009
Springer
15 years 2 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
ICTCS
2001
Springer
15 years 2 months ago
Subtyping and Matching for Mobile Objects
In [BCC00], we presented a general framework for extending calculi of mobile agents with object-oriented features, and we studied a typed instance of that model based on Cardelli a...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa