Sciweavers

5324 search results - page 56 / 1065
» Internet Security Protocols
Sort
View
FOSAD
2000
Springer
13 years 11 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
ACISP
2010
Springer
13 years 9 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
13 years 7 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
EUROMICRO
2007
IEEE
14 years 2 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...