Sciweavers

2162 search results - page 4 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
APCCM
2006
13 years 8 months ago
ServiceMosaic project: modeling, analysis and management of web services interactions
This paper provides an overview of ServiceMosaic, which is a platform for model-driven analysis and management of service interactions. In particular, in this paper, we focus on b...
Boualem Benatallah, Hamid R. Motahari Nezhad
JSW
2008
122views more  JSW 2008»
13 years 7 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
EUROCRYPT
2006
Springer
13 years 11 months ago
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll ...
Tal Moran, Moni Naor
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 7 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
TPDS
1998
71views more  TPDS 1998»
13 years 7 months ago
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability
—Rollback-Dependency Trackability (RDT) is a property that states that all rollback dependencies between local checkpoints are on-line trackable by using a transitive dependency ...
Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang