Sciweavers

483 search results - page 17 / 97
» Patterns of Protocols
Sort
View
IFIP
2004
Springer
14 years 1 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
JFP
2006
113views more  JFP 2006»
13 years 7 months ago
Efficient manipulation of binary data using pattern matching
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This article presents an appr...
Per Gustafsson, Konstantinos F. Sagonas
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
EURONGI
2008
Springer
13 years 9 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...
WIS
2004
13 years 9 months ago
Auctions in mobile multihop ad-hoc networks following the marketplace communication pattern
This paper presents UbiBay, a self-organizing distributed auction system using a mobile multihop ad-hoc network as its sole communication platform. In order to substantially increa...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...