Sciweavers

361 search results - page 37 / 73
» Composition of Password-Based Protocols
Sort
View
SIGCOMM
2003
ACM
14 years 1 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
ICSE
2009
IEEE-ACM
14 years 3 months ago
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services
Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
Javier Cámara, José Antonio Mart&iac...
ASWSD
2006
Springer
14 years 13 days ago
Reusable Services and Semi-automatic Service Composition for Automotive Software
Automotive software has become an important factor in the development of modern and innovative high-end vehicles. More and more functions can only be realized by the cooperation of...
Holger Giese
ENTCS
2008
70views more  ENTCS 2008»
13 years 8 months ago
Separate Compilation of Polychronous Specifications
As code generation for synchronous programs requires strong safety properties to be satisfied, compositionality becomes a difficult goal to achieve. Most synchronous languages, su...
Julien Ouy, Jean-Pierre Talpin, Loïc Besnard,...
CSFW
2012
IEEE
11 years 11 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...