Sciweavers

5374 search results - page 6 / 1075
» The induction of communication protocols
Sort
View
82
Voted
EUROMICRO
1998
IEEE
15 years 4 months ago
Two-Level Communication Protocol for a Web Operating System (WOS?)
The World-Wide Web consists not only of informational, but also computational resources. However, these resources, especially computational ones are underutilized. One characteris...
Gilbert Babin, Peter G. Kropf, Herwig Unger
101
Voted
MASCOTS
2008
15 years 1 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
CHARME
2001
Springer
92views Hardware» more  CHARME 2001»
15 years 3 months ago
Induction-Oriented Formal Verification in Symmetric Interconnection Networks
The framework of this paper is the formal specification and proof of applications distributed on symmetric interconnection networks, e.g. the torus or the hypercube. The algorithms...
Eric Gascard, Laurence Pierre
CAV
1998
Springer
100views Hardware» more  CAV 1998»
15 years 3 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys...
Giampaolo Bella, Lawrence C. Paulson
LATINCRYPT
2010
14 years 10 months ago
Communication Optimal Multi-valued Asynchronous Broadcast Protocol
Abstract. Broadcast (BC) is considered as the most fundamental primitive for fault-tolerant distributed computing and cryptographic protocols. An important and practical variant of...
Arpita Patra, C. Pandu Rangan