Sciweavers

3088 search results - page 37 / 618
» Multichannel Security Protocols
Sort
View
103
Voted
CCS
2006
ACM
15 years 6 months ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...
CCS
2010
ACM
15 years 2 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
119
Voted
WISA
2010
Springer
15 years 14 days ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
138
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks
—This paper studies how to select a path with the minimum cost in terms of expected end-to-end delay (EED) in a multi-radio wireless mesh network. Different from the previous eff...
Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang
131
Voted
CSFW
1998
IEEE
15 years 7 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...