Sciweavers

648 search results - page 22 / 130
» The GCHQ Protocol and Its Problems
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 11 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
CORR
2002
Springer
108views Education» more  CORR 2002»
13 years 8 months ago
Vote Elicitation: Complexity and Strategy-Proofness
Preference elicitation is a central problem in AI, and has received significant attention in single-agent settings. It is also a key problem in multiagent systems, but has receive...
Vincent Conitzer, Tuomas Sandholm
INFOCOM
2006
IEEE
14 years 2 months ago
Channel Allocation in 802.11-Based Mesh Networks
— IEEE 802.11 (WiFi) has been used beyond its original intended purpose of a tether-free LAN. In this paper, we are interested in the use of 802.11 in mesh networks. Specificall...
Bhaskaran Raman
ICNP
1998
IEEE
14 years 26 days ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
CCS
2007
ACM
14 years 2 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...