Sciweavers

4305 search results - page 135 / 861
» Analysing Protocol Implementations
Sort
View
PPL
2008
94views more  PPL 2008»
13 years 9 months ago
Self-Stabilizing Graph Protocols
We provide self-stabilizing algorithms to obtain and maintain a maximal matching, maximal independent set or minimal dominating set in a given system graph. They converge in linea...
Wayne Goddard, Stephen T. Hedetniemi, David Pokras...
PERCOM
2007
ACM
14 years 8 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
14 years 3 months ago
Adaptive Smooth Simulcast Protocol for multimedia transmission
We introduce Adaptive Smooth Simulcast Protocol (ASSP) for simulcast transmission over best-effort networks. ASSP is a new multiple-rate protocol that implements a single rate TCP...
Christos Bouras, Apostolos Gkamas, Georgios Kioumo...
INDOCRYPT
2009
Springer
14 years 3 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
14 years 3 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...