Sciweavers

4305 search results - page 110 / 861
» Analysing Protocol Implementations
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 9 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
IJNSEC
2007
123views more  IJNSEC 2007»
13 years 9 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
DSN
2005
IEEE
14 years 2 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
ECIS
2003
13 years 10 months ago
Re-negotiating protocols: a way to integrate groupware in collaborative learning settings
Research is being done within the Computer Supported Collaborative Learning community to investigate how to apply the approach of Problem Oriented Project Pedagogy in distance lea...
Pernille Bjørn Rasmussen
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
14 years 1 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes