Sciweavers

820 search results - page 23 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
CCS
2010
ACM
13 years 9 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
ICC
2007
IEEE
129views Communications» more  ICC 2007»
14 years 5 months ago
Closed-Form Expressions for the Outage and Error Probabilities of Decode-and-Forward Relaying in Dissimilar Rayleigh Fading Chan
—User cooperation protocols, where mobile stations relay signals to the final destination, have been proposed for wireless networks. A general mathematical probability model is ...
Jeremiah Hu, Norman C. Beaulieu
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 8 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
IFIP
2009
Springer
14 years 3 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
PERCOM
2006
ACM
14 years 10 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano