Search

Your search keyword '"COMPUTER network protocols"' showing total 135 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal entcs: electronic notes in theoretical computer science Remove constraint Journal: entcs: electronic notes in theoretical computer science Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
135 results on '"COMPUTER network protocols"'

Search Results

1. Dimension Reduction of Large Sparse AND-NOT Network Models.

2. Modeling and Verification of RBC Handover Protocol.

3. Modeling and Verification of CAN Bus with Application Layer using UPPAAL.

4. Order-sorted Equational Unification Revisited.

5. Bounded Retransmission in Event-B∥CSP: a Case Study.

6. Verification of A Key Chain Based TTP Transparent CEM Protocol.

7. Classical Knowledge for Quantum Security.

8. Verification of Quantum Protocols with a Probabilistic Model-Checker.

9. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol.

10. A Strict-Observational Interface Theory for Analysing Service Orchestrations.

11. Model Checking of Component Protocol Conformance – Optimizations by Reducing False Negatives.

12. Behaviour Protocols for Interacting Stateful Components.

13. A Graphical User Interface for Maude-NPA.

14. Analyzing Chor Specifications by Translation into FSP.

15. Checking Protocol Compatibility using Maude.

16. Modeling and Reasoning about an Attacker with Cryptanalytical Capabilities.

17. Programming with Quantum Communication.

18. Convincing Proofs for Program Certification.

19. Verifying Communication Protocols Using Live Sequence Chart Specifications.

20. Light-Weight SMT-based Model Checking.

21. Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.

22. A Complete Symbolic Bisimilarity for an Extended Spi Calculus.

23. A Learning Algorithm for Deterministic Finite Automata using JFLAP.

24. Adaptive Latency Insensitive Protocols and Elastic Circuits with Early Evaluation: A Comparative Analysis.

25. Modeling and Analyzing the Implementation of Latency-Insensitive Protocols Using the Polychrony Framework.

26. Security of RFID Protocols – A Case Study.

27. A Petri Net Model of Handshake Protocols.

28. Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks.

29. Synthesis of Reo Circuits from Scenario-based Specifications.

30. Performance Analysis of IEEE 802.11b Wireless Networks with Object Oriented Petri Nets.

31. Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets.

32. Adding Branching to the Strand Space Model.

33. Hard Life with Weak Binders.

34. Session-based Choreography with Exceptions.

35. A TLA+ Formal Specification and Verification of a New Real-Time Communication Protocol.

36. Automatic Verification of Counter Systems With Ranking Function.

37. Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives.

38. Combining Techniques to Reduce State Space and Prove Strong Properties.

39. Variant Narrowing and Equational Unification.

40. Rewriting Techniques in the Constraint Solver.

41. An Automated Approach for Proving PCL Invariants.

42. Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol.

43. Towards Merging PlatΩ and PGIP.

44. A Multi-Core Solver for Parity Games.

45. Improving Fault-based Conformance Testing.

46. A Model Checking Approach to Protocol Conversion.

47. A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks.

48. Service Discovery and Negotiation With COWS.

49. Controlling Control Flow in Web Applications.

50. fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.

Catalog

Books, media, physical & digital resources