Sciweavers

1777 search results - page 69 / 356
» Programming Cryptographic Protocols
Sort
View
FORTE
2008
13 years 10 months ago
Protocol Modeling with Model Program Composition
Designing and interoperability testing of distributed, application-level network protocols is complex. Windows, for example, supports currently more than 200 protocols, ranging fro...
Margus Veanes, Wolfram Schulte
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 1 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
CCS
2010
ACM
13 years 9 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
CN
2000
72views more  CN 2000»
13 years 8 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
ICANNGA
2007
Springer
110views Algorithms» more  ICANNGA 2007»
14 years 2 months ago
Genetic Programming for Proactive Aggregation Protocols
Abstract. We present an approach for automated generation of proactive aggregation protocols using Genetic Programming. First a short introduction into aggregation and proactive pr...
Thomas Weise, Kurt Geihs, Philipp A. Baer