Sciweavers

1653 search results - page 111 / 331
» Timed analysis of security protocols
Sort
View
139
Voted
BCS
2008
15 years 4 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
135
Voted
BROADNETS
2006
IEEE
15 years 8 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
SPW
1999
Springer
15 years 6 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
CCS
2010
ACM
15 years 2 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
116
Voted
ICCNMC
2005
Springer
15 years 8 months ago
A Novel Multi-path Routing Protocol
The paper advocates a different view of routing protocols according to technology trends nowadays. A Link State Multi-Path routing protocol, LSMP, is thereby introduced. This new h...
Xiaole Bai, Marcin Matuszewski, Shuping Liu, Raimo...