Sciweavers

1144 search results - page 59 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
102
Voted
CCS
2008
ACM
15 years 1 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
ESORICS
2005
Springer
15 years 5 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
109
Voted
ICFEM
2010
Springer
14 years 10 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...
ICMAS
2000
15 years 1 months ago
An Experimental Evaluation of Domain-Independent Fault Handling Services in Open Multi-Agent Systems
A critical challenge to creating effective open multi-agent systems is allowing them to operate effectively in the face of potential failures. In this paper we present an experimen...
Chrysanthos Dellarocas, Mark Klein
ISCIS
2004
Springer
15 years 5 months ago
System BV without the Equalities for Unit
System BV is an extension of multiplicative linear logic with a non-commutative self-dual operator. In this paper we present systems equivalent to system BV where equalities for un...
Ozan Kahramanogullari