Sciweavers

58 search results - page 2 / 12
» Amongst First-Class Protocols
Sort
View
RFIDSEC
2010
12 years 11 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 4 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
TELSYS
2002
120views more  TELSYS 2002»
13 years 4 months ago
A Receiver-Driven Transport Protocol for the Web
Abstract. In this paper, we present a receiver-oriented, request/response protocol for the Web that is compatible with the dynamics of TCP's congestion control algorithm. The ...
Rajarshi Gupta, Mike Y. Chen, Steven McCanne, Jean...
SCAM
2005
IEEE
13 years 10 months ago
Object-oriented cohesion as a surrogate of software comprehension: an empirical study
The concept of software cohesion in both the procedural and object-oriented paradigm is well known and documented. What is not so well known or documented is the perception of wha...
Steve Counsell, Stephen Swift, Allan Tucker
ICDCN
2009
Springer
13 years 11 months ago
FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications
We introduce FTRepMI, a simple fault-tolerant protocol for providing sequential consistency amongst replicated objects in a grid, without using any centralized components. FTRepMI ...
Ana-Maria Oprescu, Thilo Kielmann, Wan Fokkink