Sciweavers

5374 search results - page 2 / 1075
» The induction of communication protocols
Sort
View
ICML
2010
IEEE
13 years 6 months ago
Multiagent Inductive Learning: an Argumentation-based Approach
Multiagent Inductive Learning is the problem that groups of agents face when they want to perform inductive learning, but the data of interest is distributed among them. This pape...
Santiago Ontañón, Enric Plaza
TPHOL
2003
IEEE
13 years 10 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
CADE
2004
Springer
14 years 5 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
CCS
2001
ACM
13 years 9 months ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov