Sciweavers

950 search results - page 135 / 190
» Process Algebra in PVS
Sort
View
PEWASUN
2006
ACM
14 years 4 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
SAC
2006
ACM
14 years 4 months ago
Extending noninterference properties to the timed world
Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain i...
Jian Huang, A. W. Roscoe
CSFW
2005
IEEE
14 years 3 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
IWIA
2005
IEEE
14 years 3 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
APLAS
2005
ACM
14 years 3 months ago
Race Conditions in Message Sequence Charts
Message Sequence Charts (MSCs) are a graphical language for the description of scenarios in terms of message exchanges between communicating components in a distributed environment...
Chien-An Chen, Sara Kalvala, Jane Sinclair