Sciweavers

472 search results - page 24 / 95
» The Case for Informed Transport Protocols
Sort
View
ESOP
2003
Springer
14 years 26 days ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
OHS
2001
Springer
14 years 3 days ago
FOHM+RTSP: Applying Open Hypermedia and Temporal Linking to Audio Streams
Abstract. The World Wide Web (WWW) was originally designed to handle relatively simple files, containing just text and graphics. With the development of more advanced Web browsers...
Neil Ridgway, David De Roure
JNW
2008
103views more  JNW 2008»
13 years 7 months ago
Mobility Metrics Evaluation for Self-Adaptive Protocols
Cross-layer mechanism, for which a protocol locating at a given layer uses information issued from other layers, may enhance the mobile networks performance. Some of those mechanis...
Cholatip Yawut, Béatrice Paillassa, Riadh D...
ISW
2001
Springer
14 years 3 days ago
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
Abstract. In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Al...
Olivier Markowitch, Steve Kremer
ICALP
2007
Springer
13 years 9 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou