Sciweavers

671 search results - page 86 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
TYPES
2004
Springer
15 years 5 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
FPT
2005
IEEE
198views Hardware» more  FPT 2005»
15 years 5 months ago
From TLM to FPGA: Rapid Prototyping with SystemC and Transaction Level Modeling
We describe a communication-centric design methodology with SystemC that allows for efficient FPGA prototype generation of transaction level models (TLM). Using a framework compr...
Wolfgang Klingauf, Robert Günzel
DAC
2007
ACM
15 years 3 months ago
Performance Analysis of FlexRay-based ECU Networks
It is now widely believed that FlexRay will emerge as the predominant protocol for in-vehicle automotive communication systems. As a result, there has been a lot of recent interes...
Andrei Hagiescu, Unmesh D. Bordoloi, Samarjit Chak...
CORR
2009
Springer
95views Education» more  CORR 2009»
14 years 9 months ago
Execution Models for Choreographies and Cryptoprotocols
A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial assets, we need a se...
Marco Carbone, Joshua D. Guttman
LCN
2000
IEEE
15 years 4 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee