Sciweavers

525 search results - page 14 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
ACSD
2005
IEEE
126views Hardware» more  ACSD 2005»
14 years 1 months ago
Modelling and Analysis of Distributed Simulation Protocols with Distributed Graph Transformation
This paper presents our approach to model distributed discrete event simulation systems in the framework of distributed graph transformation. We use distributed typed attributed g...
Juan de Lara, Gabriele Taentzer
ACLLAW
2011
12 years 11 months ago
Empty Categories in Hindi Dependency Treebank: Analysis and Recovery
In this paper, we first analyze and classify the empty categories in a Hindi dependency treebank and then identify various discovery procedures to automatically detect the existe...
Chaitanya G. S. K., Samar Husain, Prashanth Mannem
CSFW
2003
IEEE
14 years 29 days ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
WCNC
2008
IEEE
14 years 2 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...