Sciweavers

4305 search results - page 56 / 861
» Analysing Protocol Implementations
Sort
View
AP2PS
2009
IEEE
15 years 6 months ago
Performance Evaluation of a Chord-Based JXTA Implementation
In this paper, we propose a new implementation of the JXTA framework, based on the integration of the original JXTA version with the Chord DHT management protocol. The resulting ne...
Carlo Nocentini, Pilu Crescenzi, Leonardo Lanzi
98
Voted
ATAL
2007
Springer
15 years 8 months ago
Implementing the maximum of monotone algorithms
Running several sub-optimal algorithms and choosing the optimal one is a common procedure in computer science, most notably in the design of approximation algorithms. This paper d...
Liad Blumrosen
ESORICS
2012
Springer
13 years 4 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
157
Voted
POST
2012
181views more  POST 2012»
13 years 10 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
ACSAC
2010
IEEE
15 years 13 days ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria