Sciweavers

3115 search results - page 28 / 623
» Synthesizing Secure Protocols
Sort
View
IPPS
1998
IEEE
14 years 1 months ago
Deriving Efficient Cache Coherence Protocols through Refinement
Abstract. We address the problem of developing efficient cache coherence protocols implementing distributed shared memory (DSM) using message passing. A serious drawback of traditi...
Ratan Nalumasu, Ganesh Gopalakrishnan
AAAI
2007
13 years 11 months ago
A Modular Action Description Language for Protocol Composition
Protocols are modular abstractions that capture patterns of interaction among agents. The compelling vision behind protocols is to enable creating customized interactions by refi...
Nirmit Desai, Munindar P. Singh
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
13 years 11 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
14 years 1 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 3 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani