Sciweavers

1653 search results - page 100 / 331
» Timed analysis of security protocols
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 8 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
139
Voted
ICNP
2000
IEEE
15 years 7 months ago
Analysis of Internet Multicast Traffic Performance Considering Multicast Routing Protocol
Recently, audio and video delivery services are widely spread in the Internet. In order to deliver these data to multiple receivers at the same time, the multicast technologies ar...
Seiji Ueno, Toshihiko Kato, Kenji Suzuki
107
Voted
ESORICS
2003
Springer
15 years 7 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
QEST
2009
IEEE
15 years 9 months ago
Mean-Field Analysis for the Evaluation of Gossip Protocols
—Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial...
Rena Bakhshi, Lucia Cloth, Wan Fokkink, Boudewijn ...
131
Voted
WCNC
2008
IEEE
15 years 9 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...