Sciweavers

31 search results - page 3 / 7
» Handling message semantics with Generic Broadcast protocols
Sort
View
84
Voted
TC
2002
14 years 11 months ago
The Timewheel Group Communication System
This paper describes a group communication system called the timewheel group communication system that has been designed for a timed asynchronous distributed system model. The tim...
Shivakant Mishra, Christof Fetzer, Flaviu Cristian
114
Voted
NDSS
2008
IEEE
15 years 6 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
CORR
2006
Springer
105views Education» more  CORR 2006»
14 years 11 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 5 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
COORDINATION
2007
Springer
15 years 5 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen