Sciweavers

2162 search results - page 49 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 3 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
STACS
2007
Springer
14 years 2 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
ICC
1997
IEEE
159views Communications» more  ICC 1997»
14 years 28 days ago
Collision Avoidance and Resolution Multiple Access: First-Success Protocols
Abstract—Collision avoidance and resolution multiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and reso...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
APWEB
2006
Springer
14 years 14 days ago
Energy Efficient Protocols for Information Dissemination in Wireless Sensor Networks
Abstract. In this paper we consider a distributed and efficient information dissemination and retrieval system for wireless sensor networks. In such a system each sensor node opera...
Dandan Liu, Xiaodong Hu, Xiaohua Jia
ICMAS
1998
13 years 10 months ago
An Adaptive Choice of Messaging Protocol in Multi Agent Systems
abstract, form of this problem, we use a mathematical analysis to show that three different messaging protocols result in varying message loads, depending on certain parameters suc...
Chris Preist, Siani Pearson