Sciweavers

4305 search results - page 192 / 861
» Analysing Protocol Implementations
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
GLOBECOM
2007
IEEE
14 years 3 months ago
Distributed On Demand Channel Selection in Multi Channel, Multi Interface Wireless Mesh Networks
—In this paper we present a protocol performing on demand distributed channel selection in multi channel, multi interface wireless mesh networks, based on the exchange of control...
Stefan Bouckaert, Nicolas Letor, Chris Blondia, In...
IEEEARES
2006
IEEE
14 years 3 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
AOSE
2005
Springer
14 years 2 months ago
Hermes: Designing Goal-Oriented Agent Interactions
Interactions between agents are traditionally specified as interaction protocols using notations such as Petri nets, AUML, or finite state machines. These protocols are a poor ...
Christopher Cheong, Michael Winikoff
PDCAT
2005
Springer
14 years 2 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski