Sciweavers

1173 search results - page 16 / 235
» On the Compositionality of Round Abstraction
Sort
View
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
13 years 1 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
PAM
2005
Springer
14 years 3 months ago
Internet Routing Policies and Round-Trip-Times
Abstract. Round trip times (RTTs) play an important role in Internet measurements. In this paper, we explore some of the ways in which routing policies impact RTTs. In particular, ...
Han Zheng, Eng Keong Lua, Marcelo Pias, Timothy G....
WSS
2001
111views Control Systems» more  WSS 2001»
13 years 11 months ago
Cross-Over Composition - Enforcement of Fairness under Unfair Adversary
Abstract. We study a special type of self-stabilizing algorithms composition : the cross-over composition (A B). The cross-over composition is the generalization of the algorithm c...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
ISAS
2005
Springer
14 years 3 months ago
Contract-Based Web Service Composition Framework with Correctness Guarantees
Abstract. We present formal and practical foundations for Web service composition framework with composition correctness guarantees. We introduce contractual composition model base...
Nikola Milanovic