• Uppaal

  • Referenced in 618 articles [sw04702]
  • areas include real-time controllers and communication protocols in particular, those where timing aspects...
  • Isabelle

  • Referenced in 601 articles [sw00454]
  • proving properties of computer languages and protocols...
  • Kronos

  • Referenced in 259 articles [sw01270]
  • time deadlines. Embedded controllers, circuits and communication protocols are examples of such time-dependent systems...
  • Chord

  • Referenced in 206 articles [sw09434]
  • This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support...
  • ns-2

  • Referenced in 188 articles [sw11690]
  • simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks...
  • UNITY

  • Referenced in 173 articles [sw13461]
  • machine interference problem using the Time Warp protocol on a distributed memory parallel architecture...
  • Casper

  • Referenced in 95 articles [sw06559]
  • Compiler for the Analysis of Security Protocols. Casper is a program that will take ... description of a security protocol in a simple, abstract language, and produce a CSP description ... same protocol, suitable for checking using FDR2. It can be used either to find attacks ... upon protocols, or to show that no such attack exists, subject to the assumptions...
  • MPI/MPICH

  • Referenced in 161 articles [sw06126]
  • Interface MPI is the standard message passing protocol. MPICH is a freely available, portable implementation...
  • CESAR

  • Referenced in 155 articles [sw08510]
  • illustrate by an example, the alternating bit protocol, the use of CESAR, an interactive system...
  • HMQV

  • Referenced in 77 articles [sw02714]
  • protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly the most efficient ... known authenticated Diffie-Hellman protocols that use public-key authentication. In addition to great performance ... protocol has been designed to achieve a remarkable list of security properties. As a result ... been settled so far is whether the protocol can be proven secure in a rigorous...
  • AVISPA

  • Referenced in 81 articles [sw03172]
  • AVISPA (Automated Validation of Internet Security Protocols and Applications) is a push-button tool ... automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive ... formal language for specifying protocols and their security properties, and integrates different back-ends that...
  • CADP

  • Referenced in 129 articles [sw04993]
  • popular toolbox for the design of communication protocols and distributed systems. CADP is developed...
  • NAXOS

  • Referenced in 67 articles [sw03050]
  • Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security ... readily modified to obtain a one-pass protocol. On the other hand MQV does ... paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined’ MQV), which incorporates design ... from MQV, HMQV and AXOS. The new protocol achieves the efficiency of HMQV and admits...
  • GloMoSim

  • Referenced in 60 articles [sw13764]
  • extensible and composable: the communication protocol stack for wireless networks is divided into ... each with its own API. Models of protocols at one layer interact with those ... modular implementation enables consistent comparison of multiple protocols at a given layer. The parallel implementation ... executed using a variety of conservative synchronization protocols, which include the null message and conditional...
  • PPL

  • Referenced in 92 articles [sw05357]
  • logic languages, synchronous languages and synchronization protocols, real-time and hybrid systems. Since the seminal...
  • Cell-PLoc

  • Referenced in 90 articles [sw09126]
  • both basic research and drug discovery. This protocol is a step-by-step guide...
  • SPINS

  • Referenced in 50 articles [sw02657]
  • attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS ... resource-constrained environments. We implemented the above protocols, and show that they are practical even ... minimal hardware: the performance of the protocol suite easily matches the data rate ... used for building higher level protocols...
  • ProVerif

  • Referenced in 38 articles [sw06558]
  • ProVerif is an automatic cryptographic protocol verifier, in the formal model (so called Dolev ... model). This protocol verifier is based on a representation of the protocol by Horn clauses ... unbounded number of sessions of the protocol (even in parallel) and an unbounded message space ... attacks, but if it claims that the protocol satisfies some property, then the property...
  • Pict

  • Referenced in 71 articles [sw08929]
  • programs - idioms such as basic data structures, protocols for returning results, higher-order programming, selective...