Sciweavers

1653 search results - page 192 / 331
» Timed analysis of security protocols
Sort
View
ICDCS
2003
IEEE
14 years 3 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
IKE
2010
13 years 8 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
RTCSA
2000
IEEE
14 years 1 months ago
Space efficient wait-free buffer sharing in multiprocessor real-time systems based on timing information
A space efficient wait-free algorithm for implementing a shared buffer for real-time multiprocessor systems is presented in this paper. The commonly used method to implement share...
Håkan Sundell, Philippas Tsigas
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
CCS
2008
ACM
14 years 4 days ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...