Sciweavers

2162 search results - page 11 / 433
» A Meta-Notation for Protocol Analysis
Sort
View

Publication
152views
15 years 24 days ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ISOLA
2010
Springer
14 years 8 months ago
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agree...
Anders P. Ravn, Jirí Srba, Saleem Vighio
GLOBECOM
2010
IEEE
14 years 7 months ago
Analysis of a Distributed Queuing Medium Access Control Protocol for Cooperative ARQ
In this paper we analyze the performance of a distributed queuing medium access control (MAC) protocol designed to execute cooperative ARQ (C-ARQ) schemes at the MAC layer. Due to ...
Jesus Alonso-Zarate, L. Alonso, Charalabos Skianis...
CCS
1998
ACM
15 years 1 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
SIGCOMM
1996
ACM
15 years 1 months ago
Analysis of Techniques to Improve Protocol Processing Latency
This paper describes several techniques designed to improve protocol latency, and reports on their effectiveness when measured on a modern RISC machine employing the DEC Alpha pro...
David Mosberger, Larry L. Peterson, Patrick G. Bri...