Sciweavers

7839 search results - page 248 / 1568
» What's there and what's not
Sort
View
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 7 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
BROADNETS
2006
IEEE
15 years 7 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
15 years 7 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
ICALT
2006
IEEE
15 years 7 months ago
AWELS: Adaptive Web-Based Education and Learning Styles
Can learning styles (LS) be applied in current webbased systems? What are the main issues when applying LS in web-based systems? Can LS be authored in current web-based systems? W...
Alexandra I. Cristea, Natalia Stash
VTC
2006
IEEE
132views Communications» more  VTC 2006»
15 years 7 months ago
Interference Diversity in Frequency-Hopped Systems with Soft Decoding
— In this paper, we analyze the effect of interference diversity on the capacity of a cellular system that employs frequency hopping, power control and bit-interleaved coded modu...
Kostas Stamatiou, John G. Proakis