Sciweavers

2162 search results - page 92 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ECRTS
2006
IEEE
14 years 2 months ago
Timing Analysis of the FlexRay Communication Protocol
FlexRay will very likely become the de-facto standard for in-vehicle communications. However, before it can be successfully used for safety-critical applications that require pred...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng, Alexa...
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
14 years 3 months ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
CSFW
1999
IEEE
14 years 1 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
ESORICS
2005
Springer
14 years 2 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ESEM
2009
ACM
14 years 3 months ago
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
Bryan Robbins, Jeff Carver