Sciweavers

798 search results - page 39 / 160
» Statecharts as Protocols for Objects
Sort
View
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
15 years 6 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
ATAL
2007
Springer
15 years 6 months ago
A multilateral multi-issue negotiation protocol
In this paper, we present a new protocol to address multilateral multi-issue negotiation in a cooperative context. We consider complex dependencies between multiple issues by mode...
Miniar Hemaissia, Amal El Fallah-Seghrouchni, Chri...
CSFW
2000
IEEE
15 years 5 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 2 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
ENTCS
2000
112views more  ENTCS 2000»
15 years 1 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato