Sciweavers

IFIP
2004
Springer
14 years 2 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
IFIP
2004
Springer
14 years 2 months ago
GPS-Based Route Discovery Algorithms for On-Demand Routing Protocols in MANETs
Abstract. This papers presents new Global Positioning System (GPS)based route discovery algorithms for on-demand routing in MANETs, called Position-based Selective Flooding (PSF). ...
Mehran Abolhasan, Tadeusz A. Wysocki
IFIP
2004
Springer
14 years 2 months ago
A Trust Model with Statistical Foundation
Jianqiang Shi, Gregor von Bochmann, Carlisle M. Ad...
IFIP
2004
Springer
14 years 2 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
IFIP
2004
Springer
14 years 2 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
IFIP
2004
Springer
14 years 2 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
IFIP
2004
Springer
14 years 2 months ago
Family Secrets
James Heather, Jonathan Y. Clark
IFIP
2004
Springer
14 years 2 months ago
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study si...
Jerry den Hartog, Erik P. de Vink
IFIP
2004
Springer
14 years 2 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
IFIP
2004
Springer
14 years 2 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...