Sciweavers

3972 search results - page 57 / 795
» Design of the iSCSI Protocol
Sort
View
TCS
2002
13 years 8 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
MEMOCODE
2005
IEEE
14 years 2 months ago
Automatic synthesis of cache-coherence protocol processors using Bluespec
There are few published examples of the proof of correctness of a cache-coherence protocol expressed in an HDL. A designer generally shows the correctness of a protocol ny impleme...
Nirav Dave, Man Cheuk Ng, Arvind
INFOCOM
1999
IEEE
14 years 1 months ago
The ENTRAPID Protocol Development Environment
As Internet services rapidly become an essential part of the global infrastructure, it is necessary for the protocols underlying these services to be robust and failsafe. To achiev...
X. W. Huang, Rosen Sharma, Srinivasan Keshav
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
14 years 20 days ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
JSS
2006
65views more  JSS 2006»
13 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell