Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Abstract. The OHSWG has by now moved from specifications to running code. This is an important step, not only because this is the only way of maturing the specifications, but also ...
Natural Deduction style presentations of program logics are useful in view of the implementation of such logics in interactive proof development environments, based on type theory,...
The Real-time Channel Administration Protocol (RCAP) provides control and administration services for the Tenet real-time protocol suite, a connection-oriented suite of network an...
The aggregate motion of a flock of birds, a herd of land animals, or a school of fish is a beautiful and familiar part of the natural world. But this type of complex motion is rar...