Sciweavers

1256 search results - page 50 / 252
» A Simple E-Voting Protocol
Sort
View
93
Voted
ICSE
2008
IEEE-ACM
16 years 27 days ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
155
Voted
FOSAD
2009
Springer
15 years 7 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
ICNP
2006
IEEE
15 years 6 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui
105
Voted
SEFM
2005
IEEE
15 years 6 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
123
Voted
ALGOSENSORS
2004
Springer
15 years 6 months ago
The Expected Uncertainty of Range Free Localization Protocols in Sensor Networks
We consider three range-free localization protocols for sensor networks and analyze their accuracy in terms of the expected area of uncertainty of position per sensor. Assuming a ...
Gideon Stupp, Moshe Sidi