Sciweavers

3088 search results - page 37 / 618
» Multichannel Security Protocols
Sort
View
CCS
2006
ACM
14 years 11 days ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...
CCS
2010
ACM
13 years 8 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
WISA
2010
Springer
13 years 6 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
INFOCOM
2009
IEEE
14 years 3 months ago
Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks
—This paper studies how to select a path with the minimum cost in terms of expected end-to-end delay (EED) in a multi-radio wireless mesh network. Different from the previous eff...
Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang
CSFW
1998
IEEE
14 years 27 days ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...