Sciweavers

3815 search results - page 61 / 763
» An Implementation of Session Types
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
HT
2000
ACM
14 years 8 days ago
Linking by interacting: a paradigm for authoring hypertext
Authoring hypertext structures has always been a difficult task. The cognitive overhead problem, well known from authors when creating structured hyperdocuments, has been tackled ...
Maria da Graça Campos Pimentel, Gregory D. ...
DAGSTUHL
2007
13 years 9 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese
COMCOM
2007
106views more  COMCOM 2007»
13 years 7 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
PEPM
2007
ACM
15 years 6 months ago
Concoqtion: Indexed types now!
programming languages community is vigorously pursuing ways to incorporate F!-style indexed types into programming languages. This paper advocates Concoqtion, a practical approach ...
Emir Pasalic, Jeremy G. Siek, Seth Fogarty, Walid ...