Sciweavers

4305 search results - page 52 / 861
» Analysing Protocol Implementations
Sort
View
FCCM
2003
IEEE
185views VLSI» more  FCCM 2003»
14 years 2 months ago
Implementation of a Content-Scanning Module for an Internet Firewall
A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabit/second rates. All of the packet processing ope...
James Moscola, John W. Lockwood, Ronald Prescott L...
DSRT
2004
IEEE
14 years 17 days ago
Implementation of Host-Based Overlay Multicast to Support of Web Based Services for RT-DVS
Growing demand for use of Internet/Web-based services in real-time distributed virtual simulation (RT-DVS) and other real-time applications is fueling extensive interest in overla...
Dennis M. Moen, J. Mark Pullen, Fei Zhao
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 8 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
IJAOSE
2007
129views more  IJAOSE 2007»
13 years 8 months ago
Ontology negotiation: goals, requirements and implementation
Communication in heterogeneous multi agent systems is hampered by the lack of shared ontologies. Ontology negotiation offers an integrated approach that enables agents to gradual...
Jurriaan van Diggelen, Robbert-Jan Beun, Frank Dig...
JCS
2006
157views more  JCS 2006»
13 years 8 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov