Sciweavers

223 search results - page 7 / 45
» Design time analysis of multiagent protocols
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
IPCCC
2007
IEEE
14 years 1 months ago
Rerouting Time and Queueing in Proactive Ad Hoc Networks
In a MANET network where nodes move frequently, the probability of connectivity loss between nodes might be high, and communication sessions may easily loose connectivity during t...
Vinh Pham, Erlend Larsen, Knut Øvsthus, Paa...
ASIASIM
2004
Springer
14 years 1 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
ADAEUROPE
2005
Springer
13 years 9 months ago
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet
This paper presents the design and implementation of RT-EP (Real-Time Ethernet Protocol), which is a software-based token-passing Ethernet protocol for multipoint communications in...
José María Martínez, Michael ...
RTSS
1999
IEEE
13 years 12 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri