Sciweavers

1490 search results - page 148 / 298
» The Logic of Authentication Protocols
Sort
View
SPIN
2010
Springer
15 years 2 months ago
Combining SPIN with ns-2 for Protocol Optimization
In the field of communication networks, protocol engineers usually employ several tools focused on specific kinds of analysis, such as performance or correctness. This paper pres...
Pedro Merino, Alberto Salmeron
FMICS
2007
Springer
15 years 10 months ago
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications
Abstract. In this paper we present an action/state-based logical framework for the analysis and verification of complex systems, which relies on the definition of doubly labelled...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...
ONDM
2001
15 years 5 months ago
A Design Method of Logical Topology for IP over WDM Networks with Stable Routing
An IP (Internet Protocol) over WDM network is expected to be an infrastructure for the next
Junichi Katou, Shin'ichi Arakawa, Masayuki Murata
ISOLA
2007
Springer
15 years 10 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
KIVS
2011
Springer
14 years 6 months ago
Alister 2.0 - Programmable Logic Controllers in Railway Interlocking Systems for Regional Lines of the DB Netze AG
Railway interlockings are dominated by highly proprietary systems. We present the development project Alister 2.0 – an interlocking system based on industry-proven standard comp...
Reiner Saykowski, Elferik Schultz, Joachim Bleidie...