Sciweavers

3504 search results - page 37 / 701
» Secure protocol composition
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
77
Voted
FMCAD
2007
Springer
15 years 3 months ago
Two-Dimensional Regular Expressions for Compositional Bus Protocols
—Bus and interconnect protocols contain a few core operations (such as read and write transfers) whose behaviors interleave to form complex executions. Specifications of the cor...
Kathi Fisler
CAISE
1999
Springer
15 years 2 months ago
CPAM, A Protocol for Software Composition
Software composition is critical for building large-scale applications. In this paper, we consider the composition of components that are methods offered by heterogeneous, autonomo...
Laurence Melloul, Dorothea Beringer, Neal Sample, ...
ENTCS
2006
137views more  ENTCS 2006»
14 years 9 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò