Sciweavers

718 search results - page 31 / 144
» Operational Semantics of Security Protocols
Sort
View
USENIX
2008
13 years 10 months ago
Striping without Sacrifices: Maintaining POSIX Semantics in a Parallel File System
Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across fi...
Jan Stender, Björn Kolbeck, Felix Hupfeld, Eu...
CN
2006
117views more  CN 2006»
13 years 7 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
CCECE
2006
IEEE
14 years 1 months ago
A Survey of Secure B2C Commerce for Multicast Services
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by Network Service Providers if multicast data distribution i...
Anil Kumar Venkataiahgari, J. William Atwood, Mour...
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
IACR
2011
124views more  IACR 2011»
12 years 7 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang