Sciweavers

3088 search results - page 66 / 618
» Multichannel Security Protocols
Sort
View
CEEMAS
2001
Springer
14 years 1 months ago
On BAN Logics for Industrial Security Protocols
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters...
Nesria Agray, Wiebe van der Hoek, Erik P. de Vink
MOBICOM
2009
ACM
14 years 3 months ago
A quorum-based framework for establishing control channels in dynamic spectrum access networks
Establishing a control channel for medium access control is a challenging problem in multi-channel and dynamic spectrum access (DSA) networks. In the design of multi-channel MAC p...
Kaigui Bian, Jung Min Park, Ruiliang Chen
TON
2010
175views more  TON 2010»
13 years 3 months ago
Cooperative Adaptive Spectrum Sharing in Cognitive Radio Networks
The cognitive radio (CR) paradigm calls for open spectrum access according to a predetermined etiquette. Under this paradigm, CR nodes access the spectrum opportunistically by cont...
Haythem Bany Salameh, Marwan Krunz, Ossama Younis
JOC
2007
84views more  JOC 2007»
13 years 8 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
ASIACRYPT
2007
Springer
14 years 22 days ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...