Sciweavers

4305 search results - page 197 / 861
» Analysing Protocol Implementations
Sort
View
EUC
2007
Springer
14 years 1 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
IJIT
2004
13 years 10 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
TOSEM
2010
168views more  TOSEM 2010»
13 years 3 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
EWSN
2010
Springer
14 years 4 months ago
Making Sensornet MAC Protocols Robust against Interference
Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external i...
Carlo Alberto Boano, Thiemo Voigt, Nicolas Tsiftes...
IPPS
2007
IEEE
14 years 3 months ago
A Fault Tolerance Protocol with Fast Fault Recovery
Fault tolerance is an important issue for large machines with tens or hundreds of thousands of processors. Checkpoint-based methods, currently used on most machines, rollback all ...
Sayantan Chakravorty, Laxmikant V. Kalé