Sciweavers

4305 search results - page 7 / 861
» Analysing Protocol Implementations
Sort
View
CSFW
2010
IEEE
15 years 6 months ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...
ENTCS
2010
82views more  ENTCS 2010»
15 years 2 months ago
A Strict-Observational Interface Theory for Analysing Service Orchestrations
Service oriented computing is an accepted architectural style for developing large, distributed software systems. A particular promise of such architectures is service orchestrati...
Philip Mayer, Andreas Schroeder, Sebastian S. Baue...
139
Voted
FSEN
2007
Springer
15 years 6 months ago
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack
Abstract. Future communication and computation devices require mechanisms for on-the-fly reconfiguration in their protocol stack to operate in different situations and networks. Th...
Mahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefza...
IFIP
2010
Springer
14 years 9 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
120
Voted
MOBIHOC
2003
ACM
16 years 1 months ago
Lightweight sensing and communication protocols for target enumeration and aggregation
The development of lightweight sensing and communication protocols is a key requirement for designing resource constrained sensor networks. This paper introduces a set of efficien...
Qing Fang, Feng Zhao, Leonidas J. Guibas