Sciweavers

7329 search results - page 264 / 1466
» Network Extractor Protocols
Sort
View
AINA
2004
IEEE
15 years 7 months ago
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus
The aim of this work is to describe a tool (Spi2Java) that automatically generates Java code implementing cryptographic protocols described in the formal specification language sp...
Davide Pozza, Riccardo Sisto, Luca Durante
ECBS
2010
IEEE
113views Hardware» more  ECBS 2010»
15 years 7 months ago
Do Sensornet Protocol Variants Yield Real Benefits?
Simple, stateless networking protocols provide a low-cost and predictable foundation upon which to build decentralised applications. Sensornets are complex, containing emergent be...
Jonathan Tate, Iain Bate
CCS
2008
ACM
15 years 6 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
JNW
2008
103views more  JNW 2008»
15 years 4 months ago
Mobility Metrics Evaluation for Self-Adaptive Protocols
Cross-layer mechanism, for which a protocol locating at a given layer uses information issued from other layers, may enhance the mobile networks performance. Some of those mechanis...
Cholatip Yawut, Béatrice Paillassa, Riadh D...
ICNP
2003
IEEE
15 years 9 months ago
A Bidding Protocol for Deploying Mobile Sensors
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high...
Guiling Wang, Guohong Cao, Thomas F. La Porta