In recent years, many advances have been made in cryptography, as well as in the performance of communication networks and processors. As a result, many advanced cryptographic pro...
Sarah Meiklejohn, C. Christopher Erway, Alptekin K...
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Running several sub-optimal algorithms and choosing the optimal one is a common procedure in computer science, most notably in the design of approximation algorithms. This paper d...
Abstract— Combining multi-source cooperation and linkadaptive regenerative techniques, we develop a novel protocol capable of achieving diversity up to the number of cooperating ...
Alfonso Cano, Tairan Wang, Alejandro Ribeiro, Geor...
Traditional application programming interfaces for transport protocols make a virtue of hiding most internal per-connection state. We argue that this informationhiding precludes m...
Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Low...