Sciweavers

5374 search results - page 11 / 1075
» The induction of communication protocols
Sort
View
CCS
2001
ACM
15 years 6 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
139
Voted
FORMATS
2004
Springer
15 years 5 months ago
Modeling and Verification of a Fault-Tolerant Real-Time Startup Protocol Using Calendar Automata
We discuss the modeling and verification of real-time systems using the SAL model checker. A new modeling framework based on event calendars enables dense timed systems to be descr...
Bruno Dutertre, Maria Sorea
FORTE
2008
15 years 3 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
85
Voted
TPDS
1998
71views more  TPDS 1998»
15 years 1 months ago
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability
—Rollback-Dependency Trackability (RDT) is a property that states that all rollback dependencies between local checkpoints are on-line trackable by using a transitive dependency ...
Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
77
Voted
ICC
1997
IEEE
15 years 6 months ago
An Energy-Conserving Access Protocol for Wireless Communication
Imrich Chlamtac, Chiara Petrioli, Jason Redi