In this paper we introduce a model for direct communication in situated multi-agent systems. Direct communication is typically associated with cognitive agents, where the informat...
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
With BitTorrent-like protocols a client may download a file from a large and changing set of peers, using connections of heterogeneous and timevarying bandwidths. This flexibility ...