Sciweavers

2214 search results - page 28 / 443
» Dynamic Protocol Recovery
Sort
View
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 1 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
IPPS
1999
IEEE
14 years 16 hour ago
Performance Results for a Reliable Low-Latency Cluster Communication Protocol
Existing low-latency protocols make unrealistically strong assumptions about reliability. This allows them to achieve impressive performance, but also prevents this performance bei...
Stephen R. Donaldson, Jonathan M. D. Hill, David B...
FTCS
1993
81views more  FTCS 1993»
13 years 9 months ago
Nonblocking and Orphan-Free Message Logging Protocols
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic–pessimistic tradeoff is not inherent to the p...
Lorenzo Alvisi, Bruce Hoppe, Keith Marzullo
APSCC
2007
IEEE
14 years 2 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
PROMAS
2005
Springer
14 years 1 months ago
A Model-Based Executive for Commanding Robot Teams
The paper presents a way to robustly command a system of systems as a single entity. Instead of modeling each component system in isolation and then manually crafting interaction p...
Anthony Barrett