Sciweavers

671 search results - page 51 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View

Lecture Notes
773views
16 years 11 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
RTSS
1999
IEEE
15 years 5 months ago
Specification and Analysis of Soft Real-Time Systems: Quantity and Quality
This paper presents a process algebra for specifying soft real-time constraints in a compositional way. For these soft constraints we take a stochastic point of view and allow arb...
Pedro R. D'Argenio, Joost-Pieter Katoen, Ed Brinks...
SOCIALCOM
2010
14 years 11 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 7 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
ICMAS
1998
15 years 2 months ago
Interaction Protocols in Agentis
Agentis is a framework for building interactive multiagent applications which is based upon a model of agent interaction whose key elements are services and tasks. Central to the ...
Mark d'Inverno, David Kinny, Michael Luck