Sciweavers

2162 search results - page 50 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
JOT
2010
96views more  JOT 2010»
13 years 7 months ago
UML Profiles for Modeling Real-Time Communication Protocols
Validation of non-functional and functional properties of these protocols during the early stages of design and development is important to reduce cost resulting from protocol ano...
Barath Kumar, Jürgen Jasperneite
ACSC
2007
IEEE
14 years 22 days ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 11 days ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
PKC
2000
Springer
107views Cryptology» more  PKC 2000»
14 years 9 days ago
Some Remarks on a Fair Exchange Protocol
Fair exchange turns out to be an increasingly importanttopic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each...
Jianying Zhou, Robert H. Deng, Feng Bao
PEWASUN
2008
ACM
13 years 10 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek