Sciweavers

4305 search results - page 135 / 861
» Analysing Protocol Implementations
Sort
View
135
Voted
PPL
2008
94views more  PPL 2008»
15 years 2 months ago
Self-Stabilizing Graph Protocols
We provide self-stabilizing algorithms to obtain and maintain a maximal matching, maximal independent set or minimal dominating set in a given system graph. They converge in linea...
Wayne Goddard, Stephen T. Hedetniemi, David Pokras...
134
Voted
PERCOM
2007
ACM
16 years 2 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
15 years 9 months ago
Adaptive Smooth Simulcast Protocol for multimedia transmission
We introduce Adaptive Smooth Simulcast Protocol (ASSP) for simulcast transmission over best-effort networks. ASSP is a new multiple-rate protocol that implements a single rate TCP...
Christos Bouras, Apostolos Gkamas, Georgios Kioumo...
INDOCRYPT
2009
Springer
15 years 9 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
73
Voted
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 8 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...