Sciweavers

1777 search results - page 173 / 356
» Programming Cryptographic Protocols
Sort
View
EPIA
1997
Springer
15 years 5 months ago
Vivid Agents Arguing about Distributed Extended Logic Programs
Argumentation semantics in extended logic programming has been defined in [5,12] for a single agent which determines its believes by an internal argumentation process. In this pap...
Michael Schroeder, Iara de Almeida Móra, Jo...
INFOCOM
2007
IEEE
15 years 7 months ago
Stream: Low Overhead Wireless Reprogramming for Sensor Networks
— Wireless reprogramming of a sensor network is useful for uploading new code or for changing the functionality of existing code. Through the process, a node should remain recept...
Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi
FECS
2006
529views Education» more  FECS 2006»
15 years 2 months ago
Student Projects in Computer Networking: Simulation versus Coding
In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
Leann Christianson, Kevin Q. Brown
ICALP
2007
Springer
15 years 7 months ago
A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)
Abstract. We provide a new characterization of certain zero-knowledge protocols as non-interactive instance-dependent commitment-schemes (NIC). To obtain this result we consider th...
Bruce M. Kapron, Lior Malka, Srinivasan Venkatesh
IJCSA
2006
95views more  IJCSA 2006»
15 years 1 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan