Sciweavers

849 search results - page 36 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 1 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
ATAL
2006
Springer
13 years 11 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 9 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
WCE
2007
13 years 8 months ago
System Design and Networking Protocols for Wireless Positioning
Abstract—The recent boom in wireless communications has led to a wide range of new applications. Wireless positioning is an emerging technology which can provide accurate locatio...
Bo Peng, Andrew H. Kemp, Washington Ochieng
HPDC
1996
IEEE
13 years 11 months ago
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
One purpose of the MBone is to study the performance of multicast and real-time protocols in global conferencing applications. Part of this evaluation is dependent on understandin...
Kevin C. Almeroth, Mostafa H. Ammar