Sciweavers

4305 search results - page 109 / 861
» Analysing Protocol Implementations
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
ATAL
2005
Springer
14 years 2 months ago
A software tool for the development of MAS communication protocols based on conversations
The work we present here is mainly concerned with interagent communication, MAS communication protocols and, in particular, software tools and environments to define, experiment a...
Madieyna Lamine Fall, Sylvain Delisle
MASCOTS
1998
13 years 10 months ago
Efficient Broadcasting Protocols for Video on Demand
Broadcasting protocols can improve the efficiency of video on demand services by reducing the bandwidth required to transmit videos that are simultaneously watched by many viewers...
Jehan-François Pâris, Steven W. Carte...
FTCS
1993
81views more  FTCS 1993»
13 years 10 months ago
Nonblocking and Orphan-Free Message Logging Protocols
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic–pessimistic tradeoff is not inherent to the p...
Lorenzo Alvisi, Bruce Hoppe, Keith Marzullo
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 9 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet