Sciweavers

372 search results - page 48 / 75
» Model Checking Commitment Protocols
Sort
View
ETFA
2006
IEEE
14 years 9 days ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
FMSD
2006
131views more  FMSD 2006»
13 years 8 months ago
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast...
Peter Csaba Ölveczky, José Meseguer, C...
LICS
1999
IEEE
14 years 27 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 2 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 1 months ago
Evolution of Planning for Wireless Communication Systems
In this paper we provide a detailed and comprehensive survey of proposed approaches for network design, charting the evolution of models and techniques for the automatic planning ...
Roger M. Whitaker, Steve Hurley