Sciweavers

1777 search results - page 159 / 356
» Programming Cryptographic Protocols
Sort
View
ESAW
2007
Springer
15 years 7 months ago
Amongst First-Class Protocols
The ubiquity of our increasingly distributed and complex computing environments have necessitated the development of programming approaches and paradigms that can automatically man...
Tim Miller, Jarred McGinnis
CCS
1998
ACM
15 years 5 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
ANSS
1995
IEEE
15 years 4 months ago
Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols
In this paper we present simulation algorithmsthat characterize the main sources of communication generated by parallel applications under both invalidate and updatebased cache co...
Ricardo Bianchini, Leonidas I. Kontothanassis
ISCC
2007
IEEE
15 years 7 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
ATAL
2005
Springer
15 years 6 months ago
Verifying Norm Compliancy of Protocols
There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can a...
Huib Aldewereld, Javier Vázquez-Salceda, Fr...