Sciweavers

5410 search results - page 111 / 1082
» When to Cross Over
Sort
View
EUROCRYPT
2004
Springer
14 years 1 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
CONCUR
2010
Springer
13 years 11 months ago
Modal Logic over Higher Dimensional Automata
Higher dimensional automata (HDA) are a model of concurrency that can express most of the traditional partial order models like Mazurkiewicz traces, pomsets, event structures, or P...
Cristian Prisacariu
JCM
2008
86views more  JCM 2008»
13 years 10 months ago
IPv6 over IEEE 802.16 (WiMAX) Networks: Facts and Challenges
Deploying the new generation "Internet Protocol" (IPv6) over 802.16-based wireless networks is facing an important challenge as the IEEE 802.16 standard is failing to sup...
Adlen Ksentini
JCP
2006
106views more  JCP 2006»
13 years 10 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JCM
2007
123views more  JCM 2007»
13 years 10 months ago
Experimental Analysis of VoIP over Wireless Local Area Networks
—VoIP is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet. VoIP became a viable alternative to the public switched ...
Abderrahmane Lakas, Mohammed Boulmalf