Sciweavers

154 search results - page 16 / 31
» Modeling and Analyzing Security in the Presence of Compromis...
Sort
View
CSFW
2007
IEEE
14 years 1 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
INFOCOM
2007
IEEE
14 years 1 months ago
On the Performance of Multiple-Tree-Based Peer-to-Peer Live Streaming
— In this paper we propose and analyze a generalized multiple-tree-based overlay architecture for peer-to-peer live streaming that employs multipath transmission and forward erro...
György Dán, Viktória Fodor, Ili...
JSAC
2010
170views more  JSAC 2010»
13 years 2 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
CSFW
2009
IEEE
13 years 11 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
ASIACRYPT
2007
Springer
14 years 1 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...