Sciweavers

4305 search results - page 273 / 861
» Analysing Protocol Implementations
Sort
View
MMMACNS
2001
Springer
15 years 7 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
126
Voted
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
ECIS
2001
15 years 3 months ago
Evaluating WAP News Sites: The Webqual/m Approach
This paper reports on the evaluation of wireless Internet news sites using the WebQual/m instrument. From initial application in the domain of traditional Internet Web sites, the ...
Stuart J. Barnes, Kenny Liu, Richard T. Vidgen
120
Voted
CONCUR
2010
Springer
15 years 3 months ago
Buffered Communication Analysis in Distributed Multiparty Sessions
Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchron...
Pierre-Malo Deniélou, Nobuko Yoshida
JAR
2008
115views more  JAR 2008»
15 years 2 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...