Sciweavers

62 search results - page 12 / 13
» Security Protocols: Principles and Calculi
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 21 days ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
RIVF
2007
13 years 9 months ago
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
POPL
2000
ACM
13 years 12 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
ACSAC
2008
IEEE
14 years 1 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...