Sciweavers

448 search results - page 17 / 90
» Playing With Population Protocols
Sort
View
ESORICS
2005
Springer
14 years 1 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
SRDS
2003
IEEE
14 years 1 months ago
Buffer Management in Probabilistic Peer-to-Peer Communication Protocols
In multipeer communication decentralised probabilistic protocols have received a lot of attention because of their robustness against faults in the communication traffic and thei...
Boris Koldehofe
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 2 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 8 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
INFOCOM
1999
IEEE
14 years 22 days ago
Improving Reliable Multicast Using Active Parity Encoding Services (APES)
We propose and evaluate novel reliable multicast protocols that combine active repair service (a.k.a. local recovery) and parity encoding (a.k.a. forward error correction or FEC) ...
Dan Rubenstein, Sneha Kumar Kasera, Donald F. Tows...