Sciweavers

60 search results - page 4 / 12
» Constraint Solving for Contract-Signing Protocols
Sort
View
B
2007
Springer
14 years 4 months ago
Time Constraint Patterns for Event B Development
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Dominique Cansell, Dominique Méry, Joris Re...
DSN
2007
IEEE
14 years 4 months ago
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints
Replicated systems that run over partitionable environments, can exhibit increased availability if isolated partitions are allowed to optimistically continue their execution indep...
Mikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer,...
INFOCOM
2009
IEEE
14 years 4 months ago
Delay-Limited Cooperative Communication with Reliability Constraints in Wireless Networks
Abstract—We investigate optimal resource allocation for delaylimited cooperative communication in time varying wireless networks. Motivated by real-time applications that have st...
Rahul Urgaonkar, Michael J. Neely
CCS
2005
ACM
14 years 3 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 10 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade