Sciweavers

1653 search results - page 134 / 331
» Timed analysis of security protocols
Sort
View
ATAL
2004
Springer
15 years 8 months ago
Non-Monotonic-Offers Bargaining Protocol
This paper discusses the strengths and weaknesses of non-monotonic-offers in alternating-offer bargaining protocol. It is commonly assumed that bargainers submit monotonic offers ...
Pinata Winoto, Gordon I. McCalla, Julita Vassileva
ASIACRYPT
2001
Springer
15 years 7 months ago
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
Dynamic group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parti...
Emmanuel Bresson, Olivier Chevassut, David Pointch...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 3 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
135
Voted
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 10 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri
99
Voted
MASCOTS
2007
15 years 4 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon