Sciweavers

2162 search results - page 133 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
PSYCHNOLOGY
2007
75views more  PSYCHNOLOGY 2007»
13 years 8 months ago
Is It Fun to Go to Sydney? Common-Sense Knowledge of Social Structures and WAP
This paper investigated how people navigate through early Wireless Application Protocol (WAP) sites using their common-sense knowledge of social structures. The study is based on ...
Ilpo Koskinen
CCS
2009
ACM
14 years 3 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ESORICS
2010
Springer
13 years 10 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
ENTCS
2010
82views more  ENTCS 2010»
13 years 9 months ago
A Strict-Observational Interface Theory for Analysing Service Orchestrations
Service oriented computing is an accepted architectural style for developing large, distributed software systems. A particular promise of such architectures is service orchestrati...
Philip Mayer, Andreas Schroeder, Sebastian S. Baue...
PAM
2012
Springer
12 years 4 months ago
Xunlei: Peer-Assisted Download Acceleration on a Massive Scale
Abstract. We take a close look at Xunlei, an enormously popular download acceleration application in China. Xunlei forms a complex ecosystem, with Xunlei peers extensively interact...
Prithula Dhungel, Keith W. Ross, Moritz Steiner, Y...