Sciweavers

2162 search results - page 15 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TPDS
2010
87views more  TPDS 2010»
13 years 5 months ago
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Abstract—In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This crea...
Minghong Lin, John C. S. Lui, Dah-Ming Chiu
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
CORR
2011
Springer
204views Education» more  CORR 2011»
12 years 11 months ago
Decentralized Supply Chain Formation: A Market Protocol and Competitive Equilibrium Analysis
Supply chain formation is the process of determining the structure and terms of exchange relationships to enable a multilevel, multiagent production activity. We present a simple ...
William E. Walsh, Michael P. Wellman
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 4 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
COMCOM
2000
143views more  COMCOM 2000»
13 years 7 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou