Zobrazeno 1 - 10
of 706
pro vyhledávání: '"C.2.2"'
Autor:
Dozier, Kahlil, Beltran, Justin, Berg, Kylie, Matousek, Hugo, Salamatian, Loqman, Katz-Bassett, Ethan, Rubenstein, Dan
Network verification (NWV), broadly defined as the verification of properties of distributed protocols used in network systems, cannot be efficiently solved on classical hardware via brute force. Prior work has developed a variety of methods that sca
Externí odkaz:
http://arxiv.org/abs/2410.17184
Autor:
Cheval, Vincent, Fontaine, Caroline
Computer-aided analysis of security protocols heavily relies on equational theories to model cryptographic primitives. Most automated verifiers for security protocols focus on equational theories that satisfy the Finite Variant Property (FVP), for wh
Externí odkaz:
http://arxiv.org/abs/2410.15289
Autor:
Ginesin, Jacob, Nita-Rotaru, Cristina
Secure instant group messaging applications such as WhatsApp, Facebook Messenger, Matrix, and the Signal Application have become ubiquitous in today's internet, cumulatively serving billions of users. Unlike WhatsApp, for example, Matrix can be deplo
Externí odkaz:
http://arxiv.org/abs/2408.12743
Wireless Network-on-Chip (WNoC) is a promising concept which provides a solution to overcome the scalability issues in prevailing networks-in-package for many-core processors. However, the electromagnetic propagation inside the chip package leads to
Externí odkaz:
http://arxiv.org/abs/2408.07421
To reduce the latency of Backpressure (BP) routing in wireless multi-hop networks, we propose to enhance the existing shortest path-biased BP (SP-BP) and sojourn time-based backlog metrics, since they introduce no additional time step-wise signaling
Externí odkaz:
http://arxiv.org/abs/2407.09753
Autor:
Aronoff, Daniel
In a Proof-of-Work blockchain such as Bitcoin mining hashrate is increasing in the block reward. An increase in hashrate reduces network vulnerability to attack (a reduction in security cost) while increasing carbon emissions and electricity cost (an
Externí odkaz:
http://arxiv.org/abs/2405.15089
Federated learning (FL) has attracted widespread attention because it supports the joint training of models by multiple participants without moving private dataset. However, there are still many security issues in FL that deserve discussion. In this
Externí odkaz:
http://arxiv.org/abs/2405.04029
Decentralized Finance (DeFi) has emerged as a contemporary competitive as well as complementary to traditional centralized finance systems. As of 23rd January 2024, per Defillama approximately USD 55 billion is the total value locked on the DeFi appl
Externí odkaz:
http://arxiv.org/abs/2403.16637
Cross-technology communication(CTC) enables seamless interactions between diverse wireless technologies. Most existing work is based on reversing the transmission path to identify the appropriate payload to generate the waveform that the target devic
Externí odkaz:
http://arxiv.org/abs/2403.10014
Mobile networks have increased spectral efficiency through advanced multiplexing strategies that are coordinated by base stations (BS) in licensed spectrum. However, external interference on clients leads to significant performance degradation during
Externí odkaz:
http://arxiv.org/abs/2403.03376