Sciweavers

529 search results - page 53 / 106
» A Fair Non-repudiation Protocol
Sort
View
VMCAI
2005
Springer
14 years 1 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
ICNP
2002
IEEE
14 years 21 days ago
Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks
This paper presents the first analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed accord...
Yu Wang, J. J. Garcia-Luna-Aceves
DBSEC
2000
94views Database» more  DBSEC 2000»
13 years 9 months ago
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
In this paper, we present a fair-exchange electronic commerce (e-commerce) protocol, based on using an online trusted third party, that ensures fairness and prevents any party fro...
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamu...
P2P
2009
IEEE
14 years 2 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
CHARME
1997
Springer
105views Hardware» more  CHARME 1997»
13 years 11 months ago
Simulation-based verification of network protocols performance
Formal verification techniques need to deal with the complexity of the systems rified. Most often, this problem is solved by taking an abstract model of the system and aiming at a...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Pa...