Sciweavers

361 search results - page 56 / 73
» Message Sequence Charts
Sort
View
FSEN
2007
Springer
15 years 3 months ago
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata
Abstract. A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due...
Mahdi Niamanesh, Rasool Jalili
88
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 3 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
73
Voted
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 3 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
104
Voted
KES
2005
Springer
15 years 3 months ago
Analysis of Parity Assignment Steganography in Palette Images
Abstract. In parity assignment-based steganography for palette images, all colors in a host image are divided into two subsets, and each pixel is used to carry one secret bit. This...
Xinpeng Zhang, Shuozhong Wang
SELMAS
2005
Springer
15 years 3 months ago
Improving Flexibility and Robustness in Agent Interactions: Extending Prometheus with Hermes
Abstract. A crucial part of multi-agent system design is the design of agent interactions. Traditional approaches to designing agent interaction use interaction protocols, which fo...
Christopher Cheong, Michael Winikoff