Sciweavers

372 search results - page 33 / 75
» Model Checking Commitment Protocols
Sort
View
FORTE
2004
13 years 10 months ago
Automatized Verification of Ad Hoc Routing Protocols
Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two...
Oskar Wibling, Joachim Parrow, Arnold Neville Pear...
COMPSAC
2008
IEEE
14 years 3 months ago
On the Performance of Transactional Remote Invocations over Commonly Used Transports
We have measured the performance of transactional remote invocations over three commonly used transports: IIOP, SOAP/HTTP, and JBoss Remoting. In the IIOP case, our transactional ...
Ivan Silva Neto, Francisco Reverbel
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
COMPSAC
2008
IEEE
14 years 3 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...