Sciweavers

CCR
2007
85views more  CCR 2007»
13 years 4 months ago
Don't optimize existing protocols, design optimizable protocols
As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of...
Jiayue He, Jennifer Rexford, Mung Chiang
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
13 years 10 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
CSSE
2008
IEEE
13 years 11 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...