Sciweavers

3815 search results - page 61 / 763
» An Implementation of Session Types
Sort
View
109
Voted
CSFW
2005
IEEE
15 years 8 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
112
Voted
HT
2000
ACM
15 years 7 months ago
Linking by interacting: a paradigm for authoring hypertext
Authoring hypertext structures has always been a difficult task. The cognitive overhead problem, well known from authors when creating structured hyperdocuments, has been tackled ...
Maria da Graça Campos Pimentel, Gregory D. ...
96
Voted
DAGSTUHL
2007
15 years 4 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese
144
Voted
COMCOM
2007
106views more  COMCOM 2007»
15 years 2 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
190
Voted
PEPM
2007
ACM
17 years 21 days ago
Concoqtion: Indexed types now!
programming languages community is vigorously pursuing ways to incorporate F!-style indexed types into programming languages. This paper advocates Concoqtion, a practical approach ...
Emir Pasalic, Jeremy G. Siek, Seth Fogarty, Walid ...