Sciweavers

248 search results - page 40 / 50
» Authentication Primitives and Their Compilation
Sort
View
NDSS
2000
IEEE
15 years 2 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
DCOSS
2008
Springer
14 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
CIA
1999
Springer
15 years 2 months ago
Mobile-Agent Mediated Place Oriented Communication
When we communicate with others in a most primitive way like face-to-face conversation, we normally gather at a common physical place. This physical constraint has been recognized ...
Yasuhiko Kitamura, Yasuhiro Mawarimichi, Shoji Tat...
ICFP
2006
ACM
15 years 9 months ago
The missing link: dynamic components for ML
Despite its powerful module system, ML has not yet evolved for the modern world of dynamic and open modular programming, to which more primitive languages have adapted better so f...
Andreas Rossberg
TLDI
2010
ACM
225views Formal Methods» more  TLDI 2010»
15 years 6 months ago
Race-free and memory-safe multithreading: design and implementation in cyclone
We present the design of a formal low-level multi-threaded language with advanced region-based memory management and synchronization primitives, where well-typed programs are memo...
Prodromos Gerakios, Nikolaos Papaspyrou, Konstanti...