Sciweavers

281 search results - page 38 / 57
» Scalable Protocols for Authenticated Group Key Exchange
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
SPW
2001
Springer
14 years 1 days ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
SYRCODIS
2008
135views Database» more  SYRCODIS 2008»
13 years 9 months ago
Realizing Fine-Granular and Scalable Transaction Isolation in Native XML Databases
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using differ...
Sebastian Bächle, Theo Härder
ICPADS
2005
IEEE
14 years 1 months ago
Group Communication Protocol for Autonomic Computing
: We discuss a group protocol which supports applications with group communication service when QoS supported by networks or required by applications is changed. An autonomic group...
Tomoya Enokido, Makoto Takizawa
ESORICS
2003
Springer
14 years 25 days ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner