Sciweavers

2214 search results - page 8 / 443
» Dynamic Protocol Recovery
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
IMA
2001
Springer
90views Cryptology» more  IMA 2001»
14 years 3 days ago
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperabi...
Konstantinos Rantos, Chris J. Mitchell
ATAL
2005
Springer
14 years 1 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu
IPPS
1999
IEEE
13 years 12 months ago
Lazy Logging and Prefetch-Based Crash Recovery in Software Distributed Shared Memory Systems
In this paper, we propose a new, efficient logging protocol, called lazy logging, and a fast crash recovery protocol, called the prefetch-based crash recovery (PCR), for software ...
Angkul Kongmunvattana, Nian-Feng Tzeng
ACSAC
2003
IEEE
13 years 11 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn