Sciweavers

34 search results - page 6 / 7
» Analysis of a gossip protocol in PRISM
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 11 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
GLOBECOM
2010
IEEE
14 years 9 months ago
Are a Few Neighboring Peers Good Enough?
Most peer-assisted media streaming systems have applied a design philosophy that uses a "mesh" topology of peers: each peer connects to a small number of neighboring peer...
Lili Zhong, Jie Dai, Bo Li, Baochun Li, Hai Jin
COMPSAC
2008
IEEE
15 years 6 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SRDS
2007
IEEE
15 years 6 months ago
RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...