Sciweavers

2162 search results - page 160 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 4 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CONEXT
2005
ACM
14 years 2 days ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
BMCBI
2007
109views more  BMCBI 2007»
13 years 10 months ago
Seahawk: moving beyond HTML in Web-based bioinformatics analysis
Background: Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple ...
Paul M. K. Gordon, Christoph W. Sensen
BMCBI
2010
112views more  BMCBI 2010»
13 years 10 months ago
The MetabolomeExpress Project: enabling web-based processing, analysis and transparent dissemination of GC/MS metabolomics datas
Background: Standardization of analytical approaches and reporting methods via community-wide collaboration can work synergistically with web-tool development to result in rapid c...
Adam J. Carroll, Murray R. Badger, A. Harvey Milla...