Sciweavers

1777 search results - page 153 / 356
» Programming Cryptographic Protocols
Sort
View
ECOOP
2009
Springer
16 years 1 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
MIDDLEWARE
2009
Springer
15 years 7 months ago
Automatic Generation of Network Protocol Gateways
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Yérom-David Bromberg, Laurent Réveil...
ESOP
2005
Springer
15 years 6 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan
ICALP
2004
Springer
15 years 6 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
PDPTA
2000
15 years 2 months ago
A Reusable Software Framework for Distributed Decision-Making Protocols
Developers of programs for distributed systems spend considerable time designing solutions to various complex decision-making problems. The work described in this paper applies th...
Sudharshan Vazhkudai, H. Conrad Cunningham