Sciweavers

382 search results - page 18 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
WWW
2007
ACM
16 years 2 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
IJIPT
2008
191views more  IJIPT 2008»
15 years 1 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
NOSSDAV
1991
Springer
15 years 5 months ago
The Real-Time Channel Administration Protocol
The Real-time Channel Administration Protocol (RCAP) provides control and administration services for the Tenet real-time protocol suite, a connection-oriented suite of network an...
Anindo Banerjea, Bruce A. Mah
ICSE
2008
IEEE-ACM
16 years 1 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
USENIX
1994
15 years 3 months ago
Latency Analysis of TCP on an ATM Network
In this paper we characterize the latency of the BSD 4.4 alpha implementation of TCP on an ATM network. Latency reduction is a difficult task, and careful analysis is the first st...
Alec Wolman, Geoffrey M. Voelker, Chandramohan A. ...