Sciweavers

336 search results - page 8 / 68
» Implementing CCS in Maude
Sort
View
CCS
1998
ACM
15 years 1 months ago
The Design, Implementation and Operation of an Email Pseudonym Server
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
David Mazières, M. Frans Kaashoek
CONCUR
2005
Springer
15 years 3 months ago
Transactions in RCCS
We propose a formalisation of the notion of transaction, using a variant of CCS, RCCS, that distinguishes reversible and irreversible actions, and incorporates a distributed backtr...
Vincent Danos, Jean Krivine
CADE
2004
Springer
15 years 9 months ago
Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools
Formal semantic definitions of concurrent languages, when specified in a well-suited semantic framework and supported by generic and efficient formal tools, can be the basis of pow...
José Meseguer, Grigore Rosu
CCS
1998
ACM
15 years 1 months ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge
CCS
2007
ACM
15 years 3 months ago
Compact FPGA implementations of QUAD
QUAD is a stream cipher whose provable security relies on the hardness of solving systems of multivariate quadratic equations. This paper explores FPGA implementations of the stre...
David Arditti, Côme Berbain, Olivier Billet,...