Protocol analysis

Results: 1021



#Item
1Protocol log analysis with constraint programming Mats Carlsson Olga Grinchtein Justin Pearson

Protocol log analysis with constraint programming Mats Carlsson Olga Grinchtein Justin Pearson

Add to Reading List

Source URL: smt2014.it.uu.se

Language: English - Date: 2014-07-18 15:02:20
2Analysis of a Gossip Protocol in PRISM Marta Kwiatkowska, Gethin Norman and David Parker Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford, OX1 3QD ABSTRACT Gossip protocols have been proposed

Analysis of a Gossip Protocol in PRISM Marta Kwiatkowska, Gethin Norman and David Parker Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford, OX1 3QD ABSTRACT Gossip protocols have been proposed

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-10-20 08:29:16
3Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Steve Kremer1 and Mark Ryan2 1  Laboratoire Sp´ecification et V´erification

Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Steve Kremer1 and Mark Ryan2 1 Laboratoire Sp´ecification et V´erification

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    4Abstract English iLAP (Laboratory data management, Analysis and Protocol development) is a web-based application which covers the data management of microscopy experiments. Hereby iLAP takes care of experiment protocols

    Abstract English iLAP (Laboratory data management, Analysis and Protocol development) is a web-based application which covers the data management of microscopy experiments. Hereby iLAP takes care of experiment protocols

    Add to Reading List

    Source URL: genome.tugraz.at

    Language: German - Date: 2015-01-26 03:08:42
      5A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

      A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2018-01-18 13:44:36
        6arXiv:1705.07327v1 [cs.DS] 20 MayDynamic Analysis of the Arrow Distributed Directory Protocol in General Networks Abdolhamid Ghodselahi and Fabian Kuhn Department of Computer Science, University of Freiburg

        arXiv:1705.07327v1 [cs.DS] 20 MayDynamic Analysis of the Arrow Distributed Directory Protocol in General Networks Abdolhamid Ghodselahi and Fabian Kuhn Department of Computer Science, University of Freiburg

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2018-07-19 12:33:07
          7Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham  Anonymity with identity escrow attempts to allow users of an on-line service to remai

          Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2011-01-18 08:48:08
            8Wheat high molecular weight DNA extraction This protocol aims to of high quality Genomic DNA from Cereals (method originally for RFLP analysis, but it is suitable for other applications). a) Equipment and reagents: Equip

            Wheat high molecular weight DNA extraction This protocol aims to of high quality Genomic DNA from Cereals (method originally for RFLP analysis, but it is suitable for other applications). a) Equipment and reagents: Equip

            Add to Reading List

            Source URL: www.wheat-training.com

            Language: English - Date: 2016-07-24 09:26:27
              91  Design and Analysis of Medium Access Protocol: Throughput and Short Term Fairness Perspective Yunbae Kim, Student Member, IEEE, and Ganguk Hwang, Member, IEEE

              1 Design and Analysis of Medium Access Protocol: Throughput and Short Term Fairness Perspective Yunbae Kim, Student Member, IEEE, and Ganguk Hwang, Member, IEEE

              Add to Reading List

              Source URL: queue.kaist.ac.kr

              Language: English - Date: 2014-11-25 20:15:40
                10Analysis of Neutral LipidsBy: Jessica Krank This protocol describes the analysis of neutral lipids from cells and is to follow a Lipid MAPS cell treatment (time course) protocol, which includes addition of inte

                Analysis of Neutral LipidsBy: Jessica Krank This protocol describes the analysis of neutral lipids from cells and is to follow a Lipid MAPS cell treatment (time course) protocol, which includes addition of inte

                Add to Reading List

                Source URL: www.lipidmaps.org

                Language: English - Date: 2018-06-07 06:17:43