Sciweavers

34 search results - page 6 / 7
» Analysis of a gossip protocol in PRISM
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
GLOBECOM
2010
IEEE
13 years 6 months ago
Are a Few Neighboring Peers Good Enough?
Most peer-assisted media streaming systems have applied a design philosophy that uses a "mesh" topology of peers: each peer connects to a small number of neighboring peer...
Lili Zhong, Jie Dai, Bo Li, Baochun Li, Hai Jin
COMPSAC
2008
IEEE
14 years 3 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SRDS
2007
IEEE
14 years 2 months ago
RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...