全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 会议名称
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 会议-出版者
  • 会议-出版地
  • 会议-主编
  • 会议-主办单位
  • 会议-举办地
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索会议录 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Modular Population Protocols NSTL国家科技图书文献中心

Michael Raskin -  《Algorithmics of Wireless Networks》 -  International Symposium on Algorithmics of Wireless Networks - 2025, - 173~187 - 共15页

摘要:Population protocols are a model of |  protocols are often studied in terms of reaching a |  design multiphase protocols as combinations of |  protocols can be performed in a uniform mechanical way |  functionality implemented by a population protocol in terms of
关键词: Population protocols |  Protocol verification |  Modularity

2. From Visual Choreographies to Flexible Information Protocols NSTL国家科技图书文献中心

Tom Lichtenstein |  Amit K. Chopra... -  《Service-Oriented Computing,Part I》 -  International Conference on Service-Oriented Computing - 2025, - 354~369 - 共16页

摘要:. In contrast, information protocols provide a |  diagrams to information protocols. Our approach enables |  resulting protocols to their requirements. | Choreographies enable the coordination of |  interactions between business partners. Established modeling
关键词: Business processes |  Interaction protocols |  Multiagent systems |  Messaging |  Information flow

3. Formally Discovering and Reproducing Network Protocols Vulnerabilities NSTL国家科技图书文献中心

Christophe Crochet |  John Aoga... -  《Secure IT Systems》 -  Nordic Conference on Secure IT Systems - 2025, - 424~443 - 共20页

摘要: protocols. This paper introduces Network Attack-centric |  discover new vulnerabilities in network protocols and |  improve the security of network protocols. |  both single-protocol and multi-protocol interactions |  protocol (MiniP) and five widely used QUIC
关键词: Formal specifications |  Formal verification |  Mutation testing |  Network attacks |  Systems |  Internet protocols |  QUIC |  Concrete implementation |  Adverse stimuli |  Framework

4. Selective Population Protocols NSTL国家科技图书文献中心

Adam Ganczorz |  Leszek Gasieniec... -  《Stabilization, Safety, and Security of Distributed Systems》 -  International Symposium on Stabilization, Safety, and Security of Distributed Systems - 2025, - 225~239 - 共15页

摘要:The model of population protocols provides a |  population protocols present an elegant and robust model | , selective variant of population protocols by introducing a |  standard population protocols, even when the leader is | , in standard population protocols. In contrast, we
关键词: Population protocol |  Stability |  Conditional interactions |  Median computation

5. Complete Graph Identification in Population Protocols NSTL国家科技图书文献中心

Haruki Kanaya |  Yuichi Sudo -  《Stabilization, Safety, and Security of Distributed Systems》 -  International Symposium on Stabilization, Safety, and Security of Distributed Systems - 2025, - 126~140 - 共15页

摘要:We consider the population protocol model |  where indistinguishable state machines, referred to as |  agents, communicate in pairs. The communication graph |  specifies potential interactions (i.e., communication | ) between agent pairs. This paper addresses the complete
关键词: Population protocols |  Graph class identification

6. User-Guided Verification of Security Protocols via Sound Animation NSTL国家科技图书文献中心

Kangfeng Ye |  Roberto Metere... -  《Software Engineering and Formal Methods》 -  International Conference on Software Engineering and Formal Methods - 2025, - 33~51 - 共19页

摘要: protocols relies on specialized researchers and complex |  Interaction Trees (ITrees) to compile protocols into |  tools, inaccessible to protocol designers who |  exchange and the Needham-Schroeder public-key protocol | Current formal verification of security
关键词: Interaction trees |  CSP |  Sound animation |  Formal verification |  Code generation |  Security protocols

7. Card-Based Protocols with Single-Card Encoding NSTL国家科技图书文献中心

Kazumasa Shinagawa -  《Theoretical Aspects of Computing - ICTAC 2024》 -  International Colloquium on Theoretical Aspects of Computing - 2025, - 182~194 - 共13页

摘要: value. In card-based protocols, although a bit value | -card encoding protocols with a failure probability |  existing protocols with two-card encoding. Second, we |  propose AND and XOR protocols, both of which have a |  a COPY protocol that takes a single-card encoding
关键词: Card-based cryptography |  Secure computation |  Single-card encoding

8. SAT-Based Quantified Symmetric Minimization of the Reachable States of Distributed Protocols: An Update NSTL国家科技图书文献中心

Yun-Rong Luo |  Aman Goel... -  《Leveraging Applications of Formal Methods,Verification and Validation,Part III.Specification and Verification》 -  International Symposium on Leveraging Applications of Formal Methods,Verification and Validation - 2025, - 374~384 - 共11页

摘要:-sorted distributed protocol specifications: protocols |  protocols can be inferred from analyzing relatively small |  protocols. | In prior work, we introduced a procedure for |  deriving minimum formulas in first-order logic (FOL) for
关键词: Distributed protocols |  Logic minimization |  Invariant inference |  Symmetry |  Quantifier inference |  Reachable states

9. Randomness in Private Sequential Stateless Protocols NSTL国家科技图书文献中心

Hari Krishnan P. Ani... |  Varun Narayanan... -  《Advances in Cryptology - ASIACRYPT 2024,Part VII》 -  International Conference on the Theory and Application of Cryptology and Information Security - 2025, - 36~66 - 共31页

摘要:-constant-times" protocols and to "read-constant-times | . Our protocols are concretely efficient, has a simple |  a novel PSS protocol for "strongly regular |  improvement over the protocol of Couteau and Rosen for AN |  protocol structure (sequential, stateless).
关键词: Randomness complexity |  Private computation |  Private sequential stateless model |  Lower bound |  Branching programs

10. Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles NSTL国家科技图书文献中心

Shohei Kaneko |  Pascal Lafourcade... -  《Information Security,Part I》 -  International Conference on Information Security - 2025, - 211~231 - 共21页

摘要: (ZKP) protocols using physical objects for four |  protocols allow a prover to convince a verifier that the |  protocols for puzzles have mainly relied on decks of cards |  protocols; moreover we show its flexibility by adapting it |  number of coins and operations in our protocols with
关键词: Card-based cryptography |  Zero-knowledge proof |  Balance scale |  Pencil-and-paper puzzle |  Sudoku
检索条件Protocols
  • 检索词扩展

NSTL主题词

  • NSTL学科导航