Sciweavers

259 search results - page 7 / 52
» ccs 2010
Sort
View
CCS
2010
ACM
13 years 10 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
CCS
2010
ACM
13 years 10 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
CCS
2010
ACM
13 years 7 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
TCS
2010
13 years 8 months ago
On the expressiveness of interaction
Subbisimilarity is proposed as a general tool to classify the relative expressive power of process calculi. The expressiveness of several variants of CCS is compared in terms of t...
Yuxi Fu, Hao Lu
VTC
2010
IEEE
116views Communications» more  VTC 2010»
13 years 8 months ago
Downlink Transmission in Multi-Carrier Systems with Reduced Feedback
— in this paper we address the problem of reducing the feedback for the downlink transmission in multi-carrier systems. In these systems multiple Component Carriers (CCs) are agg...
Yuanye Wang, Klaus I. Pedersen, Troels B. Sø...