Sciweavers

361 search results - page 56 / 73
» Message Sequence Charts
Sort
View
FSEN
2007
Springer
14 years 1 months ago
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata
Abstract. A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due...
Mahdi Niamanesh, Rasool Jalili
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 1 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 1 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
KES
2005
Springer
14 years 1 months ago
Analysis of Parity Assignment Steganography in Palette Images
Abstract. In parity assignment-based steganography for palette images, all colors in a host image are divided into two subsets, and each pixel is used to carry one secret bit. This...
Xinpeng Zhang, Shuozhong Wang
SELMAS
2005
Springer
14 years 29 days ago
Improving Flexibility and Robustness in Agent Interactions: Extending Prometheus with Hermes
Abstract. A crucial part of multi-agent system design is the design of agent interactions. Traditional approaches to designing agent interaction use interaction protocols, which fo...
Christopher Cheong, Michael Winikoff