Sciweavers

526 search results - page 93 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
SIGUCCS
2003
ACM
14 years 1 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
GLOBECOM
2008
IEEE
13 years 9 months ago
Probabilistic Path Selection in Opportunistic Cognitive Radio Networks
Abstract—We present a novel routing approach for multichannel cognitive radio networks (CRNs). Our approach is based on probabilistically estimating the available capacity of eve...
Hicham Khalife, Satyajeet Ahuja, Naceur Malouch, M...
CAV
2010
Springer
206views Hardware» more  CAV 2010»
13 years 12 months ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
CSREASAM
2006
13 years 10 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
IACR
2011
120views more  IACR 2011»
12 years 8 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo