Sciweavers

849 search results - page 47 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...
CSFW
1999
IEEE
13 years 12 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
CCS
2001
ACM
14 years 5 days ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICMCS
2009
IEEE
128views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Seacast: A protocol for peer-to-peer video streaming supporting multiple description coding
SEACAST is a peer-to-peer live streaming protocol developed at Politecnico di Torino, which aims at improving current systems in two key areas. The first is the use of fullfledged...
Simone Zezza, Enrico Magli, Gabriella Olmo, Marco ...