Sciweavers

2162 search results - page 89 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 8 months ago
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
: Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control...
Adrien van den Bossche, Thierry Val, Eric Campo
JOC
2011
157views more  JOC 2011»
13 years 3 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
INFOCOM
2005
IEEE
14 years 2 months ago
Relating two formal models of path-vector routing
— This paper unifies two independently developed formalisms for path-vector routing protocols such as the Border Gateway Protocol (BGP), the standard inter-domain routing protoc...
Aaron D. Jaggard, Vijay Ramachandran
CCS
2008
ACM
13 years 10 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 3 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri