Sciweavers

1777 search results - page 177 / 356
» Programming Cryptographic Protocols
Sort
View
CSFW
1999
IEEE
15 years 5 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
CLIMA
2004
15 years 2 months ago
Verifying Protocol Conformance for Logic-Based Communicating Agents
Communication plays a fundamental role in multi-agents systems. One of the main issues in the design of agent interaction protocols is the verification that a given protocol implem...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
JOT
2007
169views more  JOT 2007»
15 years 1 months ago
Translating AUML Diagrams into Maude Specifications: A Formal Verification of Agents Interaction Protocols
Agents Interaction Protocols (AIPs) play a crucial role in multi-agents systems development. They allow specifying sequences of messages between agents. Major proposed protocols s...
Farid Mokhati, Noura Boudiaf, Mourad Badri, Linda ...
DSN
2008
IEEE
15 years 7 months ago
A fault-tolerant directory-based cache coherence protocol for CMP architectures
Current technology trends of increased scale of integration are pushing CMOS technology into the deepsubmicron domain, enabling the creation of chips with a significantly greater...
Ricardo Fernández Pascual, José M. G...
CSE
2009
IEEE
15 years 6 months ago
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol
—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource const...
Kunjan Patel, Lim Jong Chern, Chris J. Bleakley, W...