Y Wang, C Chen, Q Jiang - Cluster Computing, 2019 - Springer
To study the application of ZigBee protocol in the security algorithm of Internet of Things, the relevant development status at home and abroad is firstly summarized and ZigBee …
There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as …
It considers at this stage to define the structure of reliability and safe future identification system and develop or adopt appropriate algorithms and security protocols to cover …
F Ferrarotti, S González, KD Schewe - Science of Computer Programming, 2019 - Elsevier
The bulk synchronous parallel (BSP) bridging model is a model for concurrent computations with alternating computation and communication phases between programs running on …
This paper presents a distributed (Bulk-Synchronous Parallel or bsp) algorithm to compute on-the-fly whether a structured model of a security protocol satisfies a ctl^*∗ formula. Using …
L Fronc, F Pommereau - … Workshop on Scalable and Usable Model …, 2011 - hal.science
Compilation of a Petri net model is one way to accelerate its veri cation through state space exploration. In this approach, code to explore the Petri net is generated, which avoids the …
Concevoir et implanter des programmes parallèles est une tâche complexe, sujette aux erreurs. La vérification des programmes parallèles est également plus difficile que celle des …
This paper presents the implementation and the performance comparisons of two Bulk- Synchronous Parallel (BSP) algorithms to compute the discrete state space of models …
F Pommereau - Application and Theory of Petri Nets and Concurrency …, 2016 - Springer
This paper presents an algebra of coloured Petri nets called the Asynchronous Box Calculus with Data, or abcd for short. abcd allows to model complex systems using a user-friendly and …