Sciweavers

1653 search results - page 207 / 331
» Timed analysis of security protocols
Sort
View
SDMW
2009
Springer
14 years 4 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
NETWORKING
2007
13 years 11 months ago
It Is Better to Give Than to Receive - Implications of Cooperation in a Real Environment
Abstract. Thanks to the immense potential cooperative communications displays, extensive investigations have been directed to examine its performance by means of both analysis and ...
Thanasis Korakis, Zhifeng Tao, Salik Makda, Boris ...
ASIACRYPT
1998
Springer
14 years 2 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
EUROSYS
2007
ACM
14 years 7 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
MASCOTS
2007
13 years 11 months ago
Multiobjective Analysis in Wireless Mesh Networks
Abstract— Wireless Mesh Networks are a scalable and costeffective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (...
Cristiana Gomes, Gurvan Huiban