Sciweavers

94 search results - page 13 / 19
» Experimental Analysis of the Arcanum Key Exchange Protocol
Sort
View
JOC
2011
157views more  JOC 2011»
13 years 2 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
ESORICS
2003
Springer
14 years 25 days ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 7 months ago
Optimizing real-time RDF data streams
Abstract. The Resource Description Framework (RDF) provides a common data model for the integration of emerging "real-time" streams of social and sensor data with the Web...
Joshua Shinavier
SENSYS
2003
ACM
14 years 26 days ago
Integrated coverage and connectivity configuration in wireless sensor networks
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Cheny...
APBC
2003
123views Bioinformatics» more  APBC 2003»
13 years 9 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King