Sciweavers

1653 search results - page 149 / 331
» Timed analysis of security protocols
Sort
View
109
Voted
HASKELL
2009
ACM
15 years 10 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
132
Voted
CCS
2006
ACM
15 years 7 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
122
Voted
PEWASUN
2008
ACM
15 years 4 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek
MASCOTS
1998
15 years 4 months ago
Simulation-based 'STRESS' Testing Case Study: A Multicast Routing Protocol
In this work, we propose a method for using simulation to analyze the robustness of multiparty (multicastbased) protocols in a systematic fashion. We call our method Systematic Te...
Ahmed Helmy, Deborah Estrin
MSWIM
2005
ACM
15 years 9 months ago
Comparison of multi-channel MAC protocols
This paper compares, through analysis and simulation, a number of multichannel MAC protocols for wireless networks. We first classify these protocols into 4 categories based on t...
Jeonghoon Mo, Hoi-sheung Wilson So, Jean C. Walran...