Sciweavers

648 search results - page 11 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 1 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
COCOON
2010
Springer
14 years 1 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
GLOBECOM
2010
IEEE
13 years 6 months ago
PRO: A Profile-Based Routing Protocol for Pocket Switched Networks
In this paper, we propose a novel routing protocol, PRO, for profile-based routing in pocket switched networks. Differing from previous routing protocols, PRO treats node encounter...
Murat Ali Bayir, Murat Demirbas
AOSD
2009
ACM
14 years 3 months ago
The art of the meta-aspect protocol
ive semantics for aspect-oriented abstractions can be defined by language designers using extensible aspect compiler frameworks. However, application developers are prevented fro...
Tom Dinkelaker, Mira Mezini, Christoph Bockisch
GLOBECOM
2006
IEEE
14 years 2 months ago
Multi-Fasnet Protocol: Short-Term Fairness Control in WDM Slotted MANs
— Single-hop wavelength division multiplexing (WDM) ring networks operating in packet mode are a promising architecture for the design of innovate Metropolitan Area Networks. The...
Andrea Bianco, Davide Cuda, Jorge M. Finochietto, ...