Sciweavers

4305 search results - page 128 / 861
» Analysing Protocol Implementations
Sort
View
CONCUR
2005
Springer
14 years 2 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
CAMAD
2006
IEEE
13 years 11 months ago
Nessi: a python network simulator for fast protocol development
A new and simple network simulator Nessi is described in this paper. While other simulators focus on minimizing the simulation time, Nessi tries to minimize the development time an...
Jérôme Vernez, Jürgen Ehrensberg...
WAIM
2010
Springer
13 years 7 months ago
V Locking Protocol for Materialized Aggregate Join Views on B-Tree Indices
Immediate materialized view maintenance with transactional consistency is highly desirable to support real-time decision making. Nevertheless, due to high deadlock rates, such main...
Gang Luo
RIVF
2003
13 years 10 months ago
MAF: Un Protocole de Multicast Fiable
— This paper describes the design and implementation of a novel reliable multicast protocol, totally reliable and scalable to large number of receivers. MAF relies on Active Netw...
Prométhée Spathis, Kim Loan Thai
FORTE
1997
13 years 10 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial