Sciweavers

4305 search results - page 7 / 861
» Analysing Protocol Implementations
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...
ENTCS
2010
82views more  ENTCS 2010»
13 years 7 months ago
A Strict-Observational Interface Theory for Analysing Service Orchestrations
Service oriented computing is an accepted architectural style for developing large, distributed software systems. A particular promise of such architectures is service orchestrati...
Philip Mayer, Andreas Schroeder, Sebastian S. Baue...
FSEN
2007
Springer
13 years 11 months ago
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack
Abstract. Future communication and computation devices require mechanisms for on-the-fly reconfiguration in their protocol stack to operate in different situations and networks. Th...
Mahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefza...
IFIP
2010
Springer
13 years 2 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
MOBIHOC
2003
ACM
14 years 7 months ago
Lightweight sensing and communication protocols for target enumeration and aggregation
The development of lightweight sensing and communication protocols is a key requirement for designing resource constrained sensor networks. This paper introduces a set of efficien...
Qing Fang, Feng Zhao, Leonidas J. Guibas