Sciweavers

1777 search results - page 160 / 356
» Programming Cryptographic Protocols
Sort
View
EUROPAR
2000
Springer
15 years 5 months ago
Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures
In this paper we discuss the behavior of the replacement mechanism of well-known COMA protocols applied to a loosely-coupled multicomputer system sharing a common bus. We also pres...
Diego R. Llanos Ferraris, Benjamín Sahelice...
CCS
2005
ACM
15 years 6 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
IFIP
2004
Springer
15 years 6 months ago
Formal Analysis of a Fair Payment Protocol
We formally specify a payment protocol described in [Vogt et al., 2001]. This protocol is intended for fair exchange of time-sensitive data. Here the µCRL language is used to form...
Jan Cederquist, Muhammad Torabi Dashti
ICPPW
2002
IEEE
15 years 6 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
IPPS
2002
IEEE
15 years 6 months ago
Portals 3.0: Protocol Building Blocks for Low Overhead Communication
This paper describes the evolution of the Portals message passing architecture and programming interface from its initial development on tightly-coupled massively parallel platfor...
Ron Brightwell, William Lawry, Arthur B. Maccabe, ...