Sciweavers

318 search results - page 36 / 64
» A New Family of Authentication Protocols
Sort
View
ICUMT
2009
13 years 5 months ago
A COP for cooperation in a P2P streaming protocol
This paper introduces a Combinatory Optimization Problem (COP) which captures the performance in cooperation of a P2P Streaming Network, considered at the buffer level. A new famil...
María Elisa Bertinat, Darío Padula, ...
CSFW
2007
IEEE
14 years 2 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
ICIW
2007
IEEE
14 years 2 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
GLOBECOM
2007
IEEE
14 years 2 months ago
The Design and Analysis of Protocol Sequences for Robust Wireless Accessing
Abstract—In this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple...
Chung Shue Chen, Wing Shing Wong, Yeqiong Song
PODC
1994
ACM
13 years 11 months ago
Using Belief to Reason about Cache Coherence
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...