Sciweavers

4305 search results - page 163 / 861
» Analysing Protocol Implementations
Sort
View
EUROCRYPT
2006
Springer
14 years 24 days ago
Simplified Threshold RSA with Adaptive and Proactive Security
We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding stra...
Jesús F. Almansa, Ivan Damgård, Jespe...
MMNS
2000
98views Multimedia» more  MMNS 2000»
13 years 10 months ago
Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services
: Growing dependence of commerce, industry and academia on the Internet underlines importance of analyzing its behavior. Changing Internet structure makes the gathered data quickly...
Selim Gurun, Boleslaw K. Szymanski
ICIW
2007
IEEE
13 years 9 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
14 years 2 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...
AINA
2003
IEEE
14 years 2 months ago
Towards RSVP Lite: Light-Weight RSVP for Generic Signaling
RSVP is a reservation setup protocol designed specifically to support QoS signaling in the Internet. However, RSVP end-to-end signaled QoS for the Internet has not become a reali...
Xiaoming Fu, Cornelia Kappler