Sciweavers

4305 search results - page 646 / 861
» Analysing Protocol Implementations
Sort
View
ENTCS
2008
110views more  ENTCS 2008»
15 years 4 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
CEE
2006
94views more  CEE 2006»
15 years 4 months ago
Study and performance analysis of transport layer mechanisms applied in military radio environment
The need for reliable data communication performed in critical conditions and the respect of real-time constraints is an open issue in radio-military networks, where fixed and nom...
Tomaso de Cola, Mario Marchese
CORR
2006
Springer
82views Education» more  CORR 2006»
15 years 4 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
PE
2006
Springer
158views Optimization» more  PE 2006»
15 years 4 months ago
Performance evaluation of multiple-rate mobile ad hoc networks
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld