Sciweavers

2421 search results - page 217 / 485
» Message from the Editor-in-Chief
Sort
View
ESOP
2004
Springer
15 years 7 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
HUC
2004
Springer
15 years 7 months ago
WatchMe: Communication and Awareness Between Members of a Closely-Knit Group
WatchMe is a personal communicator with context awareness in a wristwatch form; it is meant to keep intimate friends and family always connected via awareness cues and text, voice ...
Natalia Marmasse, Chris Schmandt, David Spectre
WS
2003
ACM
15 years 7 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
POPL
2000
ACM
15 years 6 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
PARCO
1997
15 years 3 months ago
Scheduling Block-Cyclic Array Redistribution
This article is devoted to the run-time redistribution of arrays that are distributed in a blockcyclic fashion over a multidimensional processor grid. While previous studies have ...
Frederic Desprez, Jack Dongarra, Antoine Petitet, ...