Sciweavers

507 search results - page 36 / 102
» The relation between protocols and games
Sort
View
ATAL
2004
Springer
15 years 1 months ago
Protocol Based Communication for Situated Multi-Agent Systems
In this paper we introduce a model for direct communication in situated multi-agent systems. Direct communication is typically associated with cognitive agents, where the informat...
Danny Weyns, Elke Steegmans, Tom Holvoet
CSL
2010
Springer
14 years 10 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
SIGOPS
1998
123views more  SIGOPS 1998»
14 years 9 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
JCS
2011
91views more  JCS 2011»
14 years 4 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
NETWORKING
2007
14 years 11 months ago
Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols
With BitTorrent-like protocols a client may download a file from a large and changing set of peers, using connections of heterogeneous and timevarying bandwidths. This flexibility ...
Niklas Carlsson, Derek L. Eager