Sciweavers

1653 search results - page 129 / 331
» Timed analysis of security protocols
Sort
View
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
15 years 7 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
103
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Terabit Ethernet: A Time-Space Carrier Sense Multiple Access Method
To achieve Terabit and Petabit switching, both time (high transmission speed) and space (multi-stage interconnection network) technologies are required. We propose an Ethernet for...
Joseph Y. Hui, David A. Daniel
STOC
2003
ACM
96views Algorithms» more  STOC 2003»
16 years 3 months ago
Optimal oblivious routing in polynomial time
A recent seminal result of R?acke is that for any network there is an oblivious routing algorithm with a polylog competitive ratio with respect to congestion. Unfortunately, R?ack...
Yossi Azar, Edith Cohen, Amos Fiat, Haim Kaplan, H...
APLAS
2007
ACM
15 years 7 months ago
Timed, Distributed, Probabilistic, Typed Processes
This paper studies types and probabilistic bisimulations for a timed -calculus as an effective tool for a compositional analysis of probabilistic distributed behaviour. The types c...
Martin Berger, Nobuko Yoshida
WISA
2009
Springer
15 years 10 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...