Sciweavers

1144 search results - page 59 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
CCS
2008
ACM
14 years 11 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
ESORICS
2005
Springer
15 years 3 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
ICFEM
2010
Springer
14 years 8 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...
ICMAS
2000
14 years 11 months ago
An Experimental Evaluation of Domain-Independent Fault Handling Services in Open Multi-Agent Systems
A critical challenge to creating effective open multi-agent systems is allowing them to operate effectively in the face of potential failures. In this paper we present an experimen...
Chrysanthos Dellarocas, Mark Klein
73
Voted
ISCIS
2004
Springer
15 years 3 months ago
System BV without the Equalities for Unit
System BV is an extension of multiplicative linear logic with a non-commutative self-dual operator. In this paper we present systems equivalent to system BV where equalities for un...
Ozan Kahramanogullari