• MPI/MPICH

  • Referenced in 165 articles [sw06126]
  • Passing Interface MPI is the standard message passing protocol. MPICH is a freely available, portable...
  • KQML

  • Referenced in 31 articles [sw29718]
  • Manipulation Language (KQML), a new language and protocol for exchanging information and knowledge. This work ... both a message format and a message-handling protocol to support run-time knowledge sharing...
  • GloMoSim

  • Referenced in 60 articles [sw13764]
  • variety of conservative synchronization protocols, which include the null message and conditional event algorithms...
  • ProVerif

  • Referenced in 45 articles [sw06558]
  • sessions of the protocol (even in parallel) and an unbounded message space. This result ... attacks, but if it claims that the protocol satisfies some property, then the property...
  • Casper

  • Referenced in 95 articles [sw06559]
  • used either to find attacks upon protocols, or to show that no such attack exists ... that the intruder may overhear or intercept messages, decrypt and encrypt messages with keys that...
  • AHBP

  • Referenced in 7 articles [sw02704]
  • performance is discussed. In the protocol, messages are only rebroadcast by broadcast relay gateways that ... efficiently reduce the redundant messages which make flooding-like protocols perform badly in large dense...
  • RabbitMQ

  • Referenced in 5 articles [sw27429]
  • cloud. It supports multiple messaging protocols. RabbitMQ can be deployed in distributed and federated configurations...
  • PMaude

  • Referenced in 31 articles [sw08422]
  • concurrent communication protocols can be modelled using actors (concurrent objects with asynchronous message passing...
  • TulaFale

  • Referenced in 14 articles [sw00986]
  • mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language ... machine-checkable descriptions of SOAP-based security protocols and their properties. Our TulaFale language ... parallel), plus XML syntax (to express SOAP messaging), logical predicates (to construct ... filter SOAP messages), and correspondence assertions (to specify authentication goals of protocols). Our implementation compiles...
  • XMPP

  • Referenced in 7 articles [sw07051]
  • Extensible Messaging and Presence Protocol (XMPP) is an open technology for real-time communication, which ... wide range of applications including instant messaging, presence, multi-party chat, voice and video calls...
  • gSOAP

  • Referenced in 3 articles [sw20996]
  • schema types and the SOAP/REST XML messaging protocols to easy-to-use and efficient...
  • Proof General Kit

  • Referenced in 11 articles [sw09684]
  • component, exchanging messages using a common communication infrastructure and protocol called PGIP. The main channel...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • addition to a provably secure message transfer protocol, we have designed and implemented a server...
  • SPY

  • Referenced in 6 articles [sw22152]
  • validates communication safety properties on the global protocol, but enforces them via independent monitoring ... communication actions and message types that do not conform to the protocol. The global protocol ... level requirements, such as logical assertions on message payloads and security policies, supported by third...
  • FINJ

  • Referenced in 1 article [sw38949]
  • entities, which communicate through a simple message protocol via TCP sockets: A fault injection engine...
  • MQTT

  • Referenced in 2 articles [sw39702]
  • MQTT is a Client Server publish/subscribe messaging transport protocol. It is light weight, open, simple...
  • Interrogator

  • Referenced in 11 articles [sw36025]
  • protocol security analysis tool implemented in Prolog and based on a communicating-machine message transformation ... model with message modification threats. It supports a large and extendible class of symbolic encryption ... capability has a simple interface to the protocol and threat model...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • idealized assumption of perfect cryptography. Most of protocol verification tools are model-checking tools ... many case also a bounded size of messages [11,8,5,10]. In general, they ... applied to discover flaws in cryptographic protocols. On the contrary, tools based on induction...
  • Mungo

  • Referenced in 2 articles [sw30237]
  • permitted sequences of messages in the protocol. Protocol implementations can be validated by Mungo against...
  • EOMP

  • Referenced in 1 article [sw02808]
  • EOMP: an exactly once multicast protocol for distributed mobile systems Reliable multicast provides an elegant ... result in the loss of messages. This makes the problem of ensuring reliable multicast difficult ... exactly once multicast protocol (called EOMP) with totally ordered message delivery is proposed. An unreliable ... effectiveness of a reliable multicast protocol with totally ordered message delivery for mobile systems...