Sciweavers

648 search results - page 22 / 130
» The GCHQ Protocol and Its Problems
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 6 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
CORR
2002
Springer
108views Education» more  CORR 2002»
15 years 4 months ago
Vote Elicitation: Complexity and Strategy-Proofness
Preference elicitation is a central problem in AI, and has received significant attention in single-agent settings. It is also a key problem in multiagent systems, but has receive...
Vincent Conitzer, Tuomas Sandholm
INFOCOM
2006
IEEE
15 years 10 months ago
Channel Allocation in 802.11-Based Mesh Networks
— IEEE 802.11 (WiFi) has been used beyond its original intended purpose of a tether-free LAN. In this paper, we are interested in the use of 802.11 in mesh networks. Specificall...
Bhaskaran Raman
ICNP
1998
IEEE
15 years 8 months ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
CCS
2007
ACM
15 years 10 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...