Sciweavers

2699 search results - page 36 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ICISC
2008
89views Cryptology» more  ICISC 2008»
13 years 10 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
CCS
2007
ACM
14 years 3 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
ICS
1999
Tsinghua U.
14 years 1 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 3 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
IJISEC
2008
101views more  IJISEC 2008»
13 years 8 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna