Sciweavers

757 search results - page 104 / 152
» How secure are secure interdomain routing protocols
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 2 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
IEEEAMS
2003
IEEE
14 years 1 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
AGENTS
1998
Springer
14 years 5 days ago
A Market Architecture for Multi-Agent Contracting
We present a generalized market architecture that provides support for a variety of types of transactions, from simple buying and selling of goods and services to complex multi-age...
John Collins, Ben Youngdahl, Scott Jamison, Bamsha...
AAI
2004
114views more  AAI 2004»
13 years 7 months ago
Model Checking A Knowledge Exchange Scenario
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires ...
Sieuwert van Otterloo, Wiebe Der, Michael Wooldrid...