Sciweavers

4305 search results - page 177 / 861
» Analysing Protocol Implementations
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 3 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
DALT
2004
Springer
14 years 2 months ago
Reasoning About Agents' Interaction Protocols Inside DCaseLP
Engineering systems of heterogeneous agents is a difficult task; one of the ways for achieving the successful industrial deployment of agent technology is the development of engine...
Matteo Baldoni, Cristina Baroglio, Ivana Gungui, A...
IPTPS
2004
Springer
14 years 2 months ago
A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems
— Mutual exclusion is one of the well-studied fundamental primitives in distributed systems. However, the emerging P2P systems bring forward several challenges that can’t be co...
Shiding Lin, Qiao Lian, Ming Chen, Zheng Zhang
ICDCS
2003
IEEE
14 years 2 months ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide
INFOCOM
2003
IEEE
14 years 2 months ago
Evaluation of an Adaptive Transport Protocol
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
Benjamin Atkin, Kenneth P. Birman