Sciweavers

1653 search results - page 273 / 331
» Timed analysis of security protocols
Sort
View
DATE
2005
IEEE
164views Hardware» more  DATE 2005»
13 years 10 months ago
Fast and Accurate Transaction Level Modeling of an Extended AMBA2.0 Bus Architecture
Transaction Level Modeling (TLM) approach is used to meet the simulation speed as well as cycle accuracy for large scale SoC performance analysis. We implemented a transaction-lev...
Young-Taek Kim, Taehun Kim, Youngduk Kim, Chulho S...
GLOBECOM
2010
IEEE
13 years 6 months ago
Finite-SNR Diversity-Multiplexing Tradeoff for Two-Way Multi-Antenna Relay Fading Channels
In this paper, we study the diversity-multiplexing tradeoff (DMT) of two-way relay channels (TWRC) with multiantenna relay at finite signal-to-noise ratio (SNR). A two-phase decode...
Xiaochen Lin, Meixia Tao, Youyun Xu
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
LCN
2006
IEEE
14 years 2 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...