Sciweavers

2162 search results - page 129 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
FSTTCS
2010
Springer
13 years 7 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
IACR
2011
128views more  IACR 2011»
12 years 8 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 1 months ago
H2 performance of agreement protocol with noise: An edge based approach
— This work presents an H2 performance analysis of the agreement protocol in the presence of noise. The agreement protocol is first transformed into an equivalent system induced...
Daniel Zelazo, Mehran Mesbahi
ICCNMC
2005
Springer
14 years 2 months ago
A Novel Multi-path Routing Protocol
The paper advocates a different view of routing protocols according to technology trends nowadays. A Link State Multi-Path routing protocol, LSMP, is thereby introduced. This new h...
Xiaole Bai, Marcin Matuszewski, Shuping Liu, Raimo...
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...