Now showing items 88-90 of 99

    • Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

      Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; e.a. (2005-08-19)
      We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously ...
    • Self-Stabilizing Mobile Node Location Management and Message 

      Dolev, Shlomi; Lahiani, Limor; Lynch, Nancy; Nolte, Tina (2005-08-11)
      We present simple algorithms for achieving self-stabilizing locationmanagement and routing in mobile ad-hoc networks. While mobile clients maybe susceptible to corruption and stopping failures, mobile networks areoften ...
    • Motion Coordination Using Virtual Nodes 

      Lynch, Nancy; Mitra, Sayan; Nolte, Tina (2005-04-06)
      We describe how a virtual node abstraction layer can be used to coordinate the motion of real mobile nodes in a region of 2-space. In particular, we consider how nodes in a mobile ad hoc network can arrange themselves along ...