Sciweavers

52 search results - page 9 / 11
» Validation of Cryptographic Protocols by Efficient Automated...
Sort
View
ASIAN
2003
Springer
115views Algorithms» more  ASIAN 2003»
14 years 19 days ago
Bankable Postage for Network Services
We describe a new network service, the “ticket server”. This service provides “tickets” that a client can attach to a request for a network service (such as sending email o...
Martín Abadi, Andrew Birrell, Michael Burro...
JCM
2006
126views more  JCM 2006»
13 years 7 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
DGO
2007
174views Education» more  DGO 2007»
13 years 8 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
CCECE
2009
IEEE
14 years 15 days ago
Performance analysis of best effort support in broadband IEEE 802.16 networks
This paper presents a performance analysis of best effort support over the MAC protocol proposed in the IEEE 802.16 standard. We focus on the uplink channel since it is the critic...
Victor Rangel, Javier Gomez, Javier Chapa, Miguel ...
ASIACRYPT
2010
Springer
13 years 4 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan