Sciweavers

741 search results - page 97 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 8 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
CCECE
2006
IEEE
15 years 10 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu
150
Voted
BROADNETS
2006
IEEE
15 years 10 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
16 years 4 months ago
A Module Checking Based Converter Synthesis Approach for SoCs
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...
Roopak Sinha, Partha S. Roop, Samik Basu
140
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky