Sciweavers

648 search results - page 60 / 130
» The GCHQ Protocol and Its Problems
Sort
View
APSEC
2004
IEEE
14 years 14 days ago
Partial Bindings of Components - Any Harm?
Reuse is one of the key benefits of components. It inherently means that the functionality of a component may be employed only partially. This triggers the issue whether all of th...
Jirí Adámek, Frantisek Plasil
SWAT
1994
Springer
94views Algorithms» more  SWAT 1994»
14 years 24 days ago
On Self-Stabilizing Wait-Free Clock Synchronization
Protocols which can tolerate any number of processors failing by ceasing operation for an unbounded number of steps and resuming operation (with or) without knowing that they were...
Marina Papatriantafilou, Philippas Tsigas
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
14 years 22 days ago
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Vitaly Shmatikov, Ming-Hsiu Wang
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Communications in cellular automata
The goal of this paper is to show why the framework of communication complexity seems suitable for the study of cellular automata. Researchers have tackled different algorithmic p...
Eric Goles Ch., Pierre-Etienne Meunier, Ivan Rapap...
ACSC
2009
IEEE
14 years 22 days ago
Verification of the SIP Transaction Using Coloured Petri Nets
The Session Initiation Protocol (SIP) is one of the leading protocols for multimedia control over the Internet, including initiating, maintaining and terminating multimedia sessio...
Lin Liu