Sciweavers

1777 search results - page 132 / 356
» Programming Cryptographic Protocols
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 1 months ago
Enhanced Prolog Remote Predicate Call Protocol
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC) [1]. The Prol...
Alin Suciu, Kalman Pusztai, Andrei Diaconu
JLP
2007
95views more  JLP 2007»
15 years 1 months ago
Model checking a cache coherence protocol of a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java’s memory model and allows multithreaded Java progr...
Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald...
SIGSOFT
2000
ACM
15 years 5 months ago
Compiler and tool support for debugging object protocols
We describe an extension to the Java programming language that supports static conformance checking and dynamic debugging of object "protocols," i.e., sequencing constra...
Sergey Butkevich, Marco Renedo, Gerald Baumgartner...
ESOP
2003
Springer
15 years 6 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
IJDSN
2006
109views more  IJDSN 2006»
15 years 1 months ago
Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks
Reliable dissemination of bulk data is one of the important problems in sensor networks. For example, programming or upgrading the software in sensors at run-time requires reliabl...
Sandeep S. Kulkarni, Mahesh Arumugam