Sciweavers

4305 search results - page 122 / 861
» Analysing Protocol Implementations
Sort
View
IWPC
2009
IEEE
14 years 3 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova
IFL
2001
Springer
14 years 1 months ago
A Polynomial-Cost Non-determinism Analysis
Abstract. This paper is an extension of a previous work where two nondeterminism analyses were presented. One of them was efficient but not very powerful and the other one was more...
Ricardo Pena, Clara Segura
COLING
2010
13 years 4 months ago
Argument Optionality in the LinGO Grammar Matrix
We present a library of implemented HPSG analyses for argument optionality based on typological studies of this phenomenon in the world's languages, developed in the context ...
Safiyyah Saleem, Emily M. Bender
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 6 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
MEMOCODE
2007
IEEE
14 years 3 months ago
From WiFi to WiMAX: Techniques for High-Level IP Reuse across Different OFDM Protocols
Orthogonal Frequency-Division Multiplexing (OFDM) has become the preferred modulation scheme for both broadband and high bitrate digital wireless protocols because of its spectral...
Man Cheuk Ng, Muralidaran Vijayaraghavan, Nirav Da...