• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 16
  • 8
  • 7
  • 3
  • 3
  • 2
  • Tagged with
  • 103
  • 103
  • 66
  • 66
  • 30
  • 29
  • 25
  • 21
  • 18
  • 17
  • 17
  • 17
  • 16
  • 15
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Pipeline Banyan: design, analysis and VLSI implementation.

January 1994 (has links)
by Yeung Ming Sang. / Thesis (Ph.D.)--Chinese University of Hong Kong, 1994. / Includes bibliographical references (leaves 191-[201]). / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.1.1 --- Broadband Integrated Services Network --- p.1 / Chapter 1.1.2 --- ATM Switching Technology --- p.3 / Chapter 1.2 --- Broadband ATM Switching ´ؤ A Review --- p.4 / Chapter 1.2.1 --- Shared Memory Switches --- p.5 / Chapter 1.2.2 --- Shared Medium Switches --- p.5 / Chapter 1.2.3 --- Space-division Type Switches --- p.6 / Chapter 1.3 --- Motivation and Contributions --- p.13 / Chapter 1.4 --- Overview of the Thesis --- p.13 / Chapter 2 --- Pipeline Banyan Switch Architecture --- p.15 / Chapter 2.1 --- Switch Architecture --- p.15 / Chapter 2.2 --- Switch Operation --- p.17 / Chapter 2.3 --- Switch Design --- p.19 / Chapter 2.4 --- "Priority, Broadcasting and Multicasting Mechanisms" --- p.21 / Chapter 2.5 --- Switch Speed Reduction at the Control Plane --- p.23 / Chapter 3 --- Performance Evaluation of Pipeline Banyan --- p.27 / Chapter 3.1 --- Performance under Uniform and Independent Traffic Pattern --- p.27 / Chapter 3.1.1 --- Analysis of Packet Loss Performance --- p.27 / Chapter 3.1.2 --- Throughput Performance --- p.32 / Chapter 3.1.3 --- Delay Performance --- p.36 / Chapter 3.1.4 --- Comparison of Loss Performance of Banyan-type Networks --- p.37 / Chapter 3.1.5 --- Output Queueing Capability --- p.41 / Chapter 3.2 --- Performance of the Switch under Special Traffic Pattern --- p.45 / Chapter 3.2.1 --- Performance under Bursty Traffic --- p.45 / Chapter 3.2.2 --- Performance under Hot Spot Traffic --- p.48 / Chapter 3.2.3 --- Performance under Point-to-Point Traffic --- p.51 / Chapter 3.2.4 --- Performance under Permutation Traffic --- p.52 / Chapter 3.3 --- Switch Complexity Discussion --- p.54 / Chapter 4 --- Multi-Channel Pipeline Banyan (MCPB) --- p.57 / Chapter 4.1 --- Background --- p.57 / Chapter 4.2 --- Switch Architecture --- p.59 / Chapter 4.3 --- Performance Evaluation --- p.64 / Chapter 4.3.1 --- Packet loss probability --- p.64 / Chapter 4.3.2 --- Throughput performance --- p.69 / Chapter 4.3.3 --- Delay performance --- p.69 / Chapter 4.4 --- Application of MCPB --- p.71 / Chapter 4.4.1 --- ATM Cross-connect --- p.71 / Chapter 4.4.2 --- Switch Interconnection Fabric --- p.71 / Chapter 5 --- VLSI Implementation --- p.75 / Chapter 5.1 --- Outline of a typical ATM switching system --- p.75 / Chapter 5.1.1 --- Line Interface Module --- p.75 / Chapter 5.1.2 --- System Manager Module --- p.77 / Chapter 5.1.3 --- Switch Module --- p.78 / Chapter 5.2 --- "VLSI Design Technology, Procedures and Tools" --- p.78 / Chapter 5.2.1 --- Design Technology --- p.78 / Chapter 5.2.2 --- Procedures and Tools --- p.79 / Chapter 5.3 --- Logic Design of ATM Switch Module --- p.80 / Chapter 5.3.1 --- Switching Element in Control Plane --- p.80 / Chapter 5.3.2 --- Switching Element in Data Plane --- p.86 / Chapter 5.3.3 --- Clock Generator for Synchronization --- p.93 / Chapter 5.3.4 --- Schematic of Control Plane --- p.98 / Chapter 5.3.5 --- Schematic of Data Plane --- p.98 / Chapter 5.3.6 --- Timing Diagrams --- p.98 / Chapter 5.4 --- Chip Summary --- p.107 / Chapter 5.5 --- Experiences --- p.109 / Chapter 5.5.1 --- Core Size Limitation --- p.109 / Chapter 5.5.2 --- Pin Count Limitation --- p.110 / Chapter 5.5.3 --- Speed Limitation --- p.111 / Chapter 5.5.4 --- Other Design Considerations --- p.111 / Chapter 5.6 --- Discussions --- p.112 / Chapter 6 --- Dynamic Priority Schemes for Fast Packet Switches --- p.114 / Chapter 6.1 --- Motivation --- p.114 / Chapter 6.2 --- Switch Architecture --- p.118 / Chapter 6.3 --- QCPD: Queueing Controlled Priority Discipline --- p.121 / Chapter 6.3.1 --- Algorithm QCPD --- p.121 / Chapter 6.4 --- BCPD: Blocking Controlled Priority Discipline --- p.122 / Chapter 6.4.1 --- Algorithm BCPD_FT --- p.122 / Chapter 6.4.2 --- Delay Guarantee by Algorithm BCPD_FT --- p.123 / Chapter 6.4.3 --- Algorithm BCPD_DT --- p.126 / Chapter 6.4.4 --- Delay Guarantee by Algorithm BCPD_DT --- p.128 / Chapter 6.5 --- HCPD: Hybrid Controlled Priority Discipline --- p.134 / Chapter 6.5.1 --- Algorithms HCPD_FT and HCPD_DT --- p.135 / Chapter 6.6 --- Performance Studies --- p.136 / Chapter 6.6.1 --- Performance Comparison of the Priority Schemes --- p.136 / Chapter 6.6.2 --- Cell Loss Performance of HCPD_DT --- p.140 / Chapter 6.6.3 --- Input Queue Distribution of HCPD_DT --- p.142 / Chapter 6.6.4 --- Delay Bound of HCPD_DT --- p.144 / Chapter 6.6.5 --- Performance of HCPD_DT under Priority Traffic --- p.148 / Chapter 6.7 --- The use of HCPD_DT in Pipeline Banyan --- p.152 / Chapter 6.8 --- Conclusion --- p.153 / Chapter 7 --- Summary and Future Work --- p.155 / Chapter 7.1 --- Summary --- p.155 / Chapter 7.2 --- Future Work --- p.156 / Chapter A --- Verilog HDL descriptions of 16x16 Pipeline Banyan --- p.158 / Chapter B --- User's Guide of 16x16 Pipeline Banyan Chip Set --- p.182 / Chapter B.l --- Specification --- p.182 / Chapter B.2 --- Control Plane Chip and Data Plane Chip Pinout --- p.183 / Chapter B.2.1 --- Control Plane Chip Pinout --- p.183 / Chapter B.2.2 --- Data Plane Chip Pinout --- p.183 / Chapter B.3 --- Signal Descriptions --- p.186 / Chapter B.3.1 --- Signal Descriptions of Control Plane Chip --- p.186 / Chapter B.3.2 --- Signal Descriptions of Data Plane Chip --- p.187 / Chapter B.4 --- Connection Examples --- p.188 / Bibliography --- p.191
42

Traffic management framework for supporting integrated services in cross-path switch.

January 2000 (has links)
Lau Tsz-ming. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 57-[61]). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Integrated Services Architecture --- p.2 / Chapter 1.2 --- Cross-path Switch --- p.4 / Chapter 1.2.1 --- Path Switching --- p.5 / Chapter 1.3 --- Organization of Thesis --- p.9 / Chapter 2 --- Module Architecture --- p.10 / Chapter 2.1 --- Introduction --- p.10 / Chapter 2.2 --- Notable Features --- p.11 / Chapter 3 --- Connection Admission Control and Resource Allocation --- p.14 / Chapter 3.1 --- Introduction --- p.14 / Chapter 3.2 --- Connection Admission Control --- p.15 / Chapter 3.2.1 --- Guaranteed Service --- p.15 / Chapter 3.2.2 --- Controlled-Load Service --- p.18 / Chapter 3.3 --- Resource Allocation --- p.27 / Chapter 4 --- Resource Management --- p.31 / Chapter 4.1 --- Introduction --- p.31 / Chapter 4.2 --- Scheduling Algorithm --- p.32 / Chapter 4.2.1 --- Input and Output Module --- p.32 / Chapter 4.2.2 --- Central Module --- p.34 / Chapter 4.3 --- Buffer Management --- p.39 / Chapter 4.3.1 --- Buffer Partitioning --- p.40 / Chapter 4.3.2 --- Dicard Policy --- p.40 / Chapter 5 --- Design Issue of Cross-path Switch --- p.43 / Chapter 5.1 --- Introduction --- p.43 / Chapter 5.2 --- Stability Condition --- p.44 / Chapter 5.3 --- Supplementary Admission Control Scheme --- p.46 / Chapter 5.4 --- Simulation --- p.50 / Chapter 6 --- Conclusion --- p.55 / Bibliography --- p.57
43

Deslocar para permanecer: implicações políticas das redes digitais nos processos criativos colaborativos / Shift to remain:political implications of digital networks in collaborative creative processes

Albuquerque, Iara Cerqueira Linhares de 20 December 2016 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-01-12T17:49:32Z No. of bitstreams: 1 Iara Cerqueira Linhares de Albuquerque.pdf: 9766212 bytes, checksum: b3240d369fc6fbab6d761cb3cbad0218 (MD5) / Made available in DSpace on 2017-01-12T17:49:32Z (GMT). No. of bitstreams: 1 Iara Cerqueira Linhares de Albuquerque.pdf: 9766212 bytes, checksum: b3240d369fc6fbab6d761cb3cbad0218 (MD5) Previous issue date: 2017-12-20 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / Digital networks like blogspot, wordpress and facebook have come to govern, with political and biopolitical implications, the new forms of living.Life has become a media environment, which makes the body a structuring axis of its existence.The problem that instigates this research is the paradox produced by the promise of democratization that the networks brought, reconfiguring the very concept of democracy, participation and sharing, but which did not prevent the mythification of the horizontality of communication as synonymous with the illuminist ideal of freedom, equality and fraternity (KATZ, 2014).The object taken here to investigate the transmediation in which such problem is expressed is done in the political reflections of the operation of the network environmentarticulating Clay Shirky (2011), and Castells (1999, 2003, 2013),in the proposal of subjectivity of Nikolas Rose (2011) and the imbrication between politics and life of Muniz Sodré (2002, 2006).The hypothesis is that although they are part of what Shirky calls the "culture of participation" (2011), there are fissures that indicate that the ways in which collaboration works in the digitally indexed world faces the difficulties / impossibilities that Esposito (2009, 2012)points to the "do together".Communicational activities in the network have produced immunization (Esposito, 2002) and ghettoization, reconfiguring the affectivity in various forms of social manifestations.With a qualitative methodology, which includes literature review and participation in one of the networks ctrl + alt + dança, the research will be supported in addition to the authors cited especially in the Corpomídia Theory (KATZ & GREINER) to investigate the role of the body in a possible transformation of consumers into collaborators andas an ecology of alternative possibilities of existence.Roberto Espósito (2009,2010), Maurizio Lazzaratto (2006,2013) and Paolo Virno (2010,2013) will demonstrate how the participation / collaboration networks in the digital environment are configured, and Helena Katz with the definition of indexed individual in which we are now part, will help us to analyze and test this new spatio-temporalway of life / Redes digitais como blogspot, wordpress e facebook passaram a reger, com implicações políticas e biopolíticas, as novas formas do viver. A vida transformou-se em um ambiente midiático, que faz do corpo um eixo estruturante da sua existência. O problema que instiga esta pesquisa é o paradoxo produzido pela promessa de democratização que as redes trouxeram, reconfigurando o próprio conceito de democracia, de participação e de compartilhamento, mas que não impediu a mitificação da horizontalidade de comunicação como sinônimo do ideal iluminista de liberdade, igualdade e fraternidade (KATZ, 2014). O objeto aqui tomado para investigar a transmediação na qual tal problema se expressa se faz nas reflexões políticas de funcionamento do ambiente em rede articulando Clay Shirk(2011), e Castells(1999, 2003, 2013) na proposta de subjetividade de Nikolas Rose (2011) e na imbricação entre política e vida de Muniz Sodré(2013, 2006). A hipótese é a de que embora façam parte do que Shirky nomeia de “cultura da participação” (2011), existem fissuras que indicam que as maneiras da colaboração atuar no mundo indexado digitalmente enfrenta as dificuldades/impossibilidades que Esposito (2009, 2012) aponta para o “fazer junto”. As atividades comunicacionais em rede têm produzido imunização (Esposito, 2010) e guetificação, reconfigurando as afetividades em variadas formas de manifestações sociais. Com uma metodologia de caráter qualitativo, que incluirá revisão bibliográfica, e participação em uma das redes ctrl+alt+dança, a pesquisa se apoiará, além dos autores citados, sobretudo na Teoria Corpomídia (KATZ&GREINER) para investigar o papel do corpo em uma possível transformação de consumidores em colaboradores e como uma ecologia de possibilidades alternativas de existência. Roberto Espósito (2009,2010), Maurizio Lazzaratto(2006,2013) e Paolo Virno(2010,2013) irão demonstrar como se configuram as redes de participação/colaboração no ambiente digital e Helena Katz com a definição de sujeito indexado no qual hoje somos parte, nos ajudará a analisar e testar esse novo modo de vida espaço-temporal
44

Internet e política: estudos a partir do netativismo e do comum digital / -

Roza, Erick Andre 23 May 2017 (has links)
O trabalho pretende apresentar a tese de que o netativismo pode ser lido a partir de três conceitos complementares: a Dádiva e a Reciprocidade, O Contra-Estado e o Comum. Sustentamos que é a articulação entre esses três elementos que permite uma chave de entendimento ampla à política nas redes digitais. Para desenvolver essa tese propomos um percurso histórico constitutivo da sociedade digital. Nesse processo, apresentamos uma metodologia que se ancora no princípio das afinidades ecológicas para debater o quadro histórico que nos trouxe até aqui. Feito isso o trabalho divide o netativismo em dois períodos distintos e, ao final, de posso desse conjunto apresentamos algumas expressões da política e do netativismo e suas repercussões no nosso cotidiano. / This work intends to support the thesis that netactivism can be read from three complementary concepts: \'Gift and Reciprocity\', \'Against-State\' and \'Commons\'. We allege that it is the articulation between these three elements that allows for a broad understanding of politics in digital networks.In order to develop this idea, we propose a historical background of digital society. The methodology used in doing so is anchored in the principle of ecological affinities, which is used to discuss the historical context that brought us to this moment. We then divide netactivism into two distinct eras and, in conclusion, we present some expressions of politics and netactivism and what their repercussions on our daily lives are.
45

Switch scheduling based on round robin algorithms. / CUHK electronic theses & dissertations collection

January 2006 (has links)
Recently, the Birkhoff-von Neumann (BvN) switch has become a typical model for providing QoS in input-queued switch. The major idea is to consider a set of predetermined permutation matrices as independent flows, and the scheduling problem in the input-queued switch can be simply handled by single-server scheduling algorithms, such as weighted fair queueing (WFQ). However, a number of problems are observed. Firstly, although WFQ is a fair algorithm, it has a poor delay performance that depends on the port counts. Secondly, the BvN switch does not perform well under certain traffic requirement, thus unable to provide tight performance guarantees. In this thesis, a set of admission control strategies and scheduling algorithms are therefore developed to improve the QoS performance. / The input-queued switch architecture is widely used in Internet routers, due to its ability to run at very high speeds. A central problem in designing an input-queued switch is choosing the scheduling algorithm, i.e. deciding which packets to transfer from input ports to output ports in a given timeslot. Recent research in packet switch scheduling algorithms has moved beyond throughput maximization to quality of service (QoS) control. / Choy Man Ting. / "September 2006." / Adviser: Tony T. Lee. / Source: Dissertation Abstracts International, Volume: 68-03, Section: B, page: 1815. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (p. 89-94). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
46

Non-blocking and distributed routing principles in ATM packet switching networks. / CUHK electronic theses & dissertations collection

January 1997 (has links)
by Philip Pak-tung To. / Thesis (Ph.D.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (p. 126). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Mode of access: World Wide Web.
47

A self-routing non-buffering ATM switch.

January 1996 (has links)
by Timothy Kai-Cheung Chung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1996. / Includes bibliographical references. / Chapter 1. --- INTRODUCTION --- p.1 / Chapter 2. --- ASYNCHRONOUS TRANSFER MODE SWITCHING --- p.4 / Chapter 2.1 --- Transfer Modes --- p.4 / Chapter 2.1.1 --- Circuit Switching --- p.4 / Chapter 2.1.2 --- ATM Switching --- p.6 / Chapter 2.1.3 --- Packet Switching --- p.8 / Chapter 2.2 --- Different Types of ATM Switching System --- p.8 / Chapter 2.2.1 --- Central Control Type --- p.9 / Chapter 2.2.2 --- Self-Routing Type --- p.9 / Chapter 2.3 --- Self-Routing Non-Buffering ATM Switching Node --- p.10 / Chapter 3. --- FUNCTIONAL DESCRIPTION OF MODULE ´بA´ة --- p.16 / Chapter 3.1 --- ATM Cell Format --- p.17 / Chapter 3.2 --- Concentrator --- p.17 / Chapter 3.3 --- Routing Cell --- p.19 / Chapter 4. --- PHYSICAL STRUCTURE OF MODULE ´بA´ة --- p.23 / Chapter 4.1 --- Clocking Scheme --- p.23 / Chapter 4.2 --- Concentrator --- p.25 / Chapter 4.2.1 --- 2-by-2 Sorter --- p.25 / Chapter 4.2.2 --- Input Framer --- p.30 / Chapter 4.2.3 --- Data Buffer --- p.38 / Chapter 4.3 --- Routing Cell --- p.38 / Chapter 4.3.1 --- Type I Router --- p.39 / Chapter 4.3.2 --- Type II Router --- p.42 / Chapter 4.4 --- Block By-Passed Function --- p.43 / Chapter 5. --- SIMULATION AND TEST --- p.48 / Chapter 5.1 --- Computer Simulation --- p.48 / Chapter 5.2 --- Actual Chip Testing --- p.53 / Chapter 5.3 --- Measurement Results --- p.55 / Chapter 5.3.1 --- Functionality --- p.55 / Chapter 5.3.2 --- Maximum Clock Frequency --- p.60 / Chapter 5.3.3 --- Power Dissipation --- p.61 / Chapter 6. --- CONCLUSION --- p.63 / Chapter A. --- BRIEF HISTORY OF ATM SWITCH ARCHITECTURE DEVELOPMENT --- p.65 / Chapter B. --- BIBLIOGRAPHY --- p.66 / Chapter C. --- A N-WELL CMOS PROCESS --- p.70 / Chapter D. --- CADENCE DESIGN FLOW --- p.73 / Chapter E. --- YERILOG SIMULATION PROGRAMS --- p.77 / Chapter F. --- SCHEMATIC DIAGRAMS --- p.100
48

Fuzzy logic control techniques and structures for Asynchronous Transfer Mode (ATM) based multimedia networks

Sekercioglu, Ahmet, ahmet@hyperion.ctie.monash.edu.au January 1999 (has links)
The research presented in this thesis aims to demonstrate that fuzzy logic is a useful tool for developing mechanisms for controlling traffc flow in ATM based multimedia networks to maintain quality of service (QoS) requirements and maximize resource utilization. The study first proposes a hierarchical, multilevel control structure for ATM networks to exploit the reported strengths of fuzzy logic at various control levels. Then, an extensive development and evaluation is presented for a subset of the proposed control architecture at the congestion control level. An ATM based multimedia network must have quite sophisticated traffc control capabilities to effectively handle the requirements of a dynamically varying mixture of voice, video and data services while meeting the required levels of performance. Feedback control techniques have an essential role for the effective and efficient management of the resources of ATM networks. However, development of conventional feedback control techniques relies on the availability of analytical system models. The characteristics of ATM networks and the complexity of service requirements cause the analytical modeling to be very difficult, if not impossible. The lack of realistic dynamic explicit models leads to substantial problems in developing control solutions for B-ISDN networks. This limits the ability of conventional techniques to directly address the control objectives for ATM networks. In the literature, several connection admission and congestion control methods for B-ISDN networks have been reported, and these have achieved mixed success. Usually they either assume heavily simplified models, or they are too complicated to implement, mainly derived using probabilistic (steady-state) models. Fuzzy logic controllers, on the other hand, have been applied successfully to the task of controlling systems for which analytical models are not easily obtainable. Fuzzy logic control is a knowledge-based control strategy that can be utilized when an explicit model of a system is not available or, the model itself, if available, is highly complex and nonlinear. In this case, the problem of control system design is based on qualitative and/or empirically acquired knowledge regarding the operation of the system. Representation of qualitative or empirically acquired knowledge in a fuzzy logic controller is achieved by linguistic expressions in the form of fuzzy relational equations. By using fuzzy relational equations, classifications related to system parameters can be derived without explicit description. The thesis presents a new predictive congestion control scheme, Fuzzy Explicit Rate Marking (FERM), which aims to avoid congestion, and by doing so minimize the cell losses, attain high server utilization, and maintain the fair use of links. The performance of the FERM scheme is extremely competitive with that of control schemes developed using traditional methods over a considerable period of time. The results of the study demonstrate that fuzzy logic control is a highly effective design tool for this type of problems, relative to the traditional methods. When controlled systems are highly nonlinear and complex, it keeps the human insight alive and accessible at the lower levels of the control hierarchy, and so higher levels can be built on this understanding. Additionally, the FERM scheme has been extended to adaptively tune (A-FERM) so that continuous automatic tuning of the parameters can be achieved, and thus be more adaptive to system changes leading to better utilization of network bandwidth. This achieves a level of robustness that is not exhibited by other congestion control schemes reported in the literature. In this work, the focus is on ATM networks rather than IP based networks. For historical reasons, and due to fundamental philosophical differences in the (earlier) approach to congestion control, the research for control of TCP/IP and ATM based networks proceeded separately. However, some convergence between them has recently become evident. In the TCP/IP literature proposals have appeared on active queue management in routers, and Explicit Congestion Notication (ECN) for IP. It is reasonably expected that, the algorithms developed in this study will be applicable to IP based multimedia networks as well.
49

Resource management of integrated services networks /

Serbest, Yetik, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 143-150). Available also in a digital version from Dissertation Abstracts.
50

Formal verification of secured routing protocols

Arnaud, Mathilde 13 December 2011 (has links) (PDF)
With the development of digital networks, such as Internet, communication protocols are omnipresent. Digital devices have to interact with each other in order to perform the numerous and complex tasks we have come to expect as commonplace, such as using a mobile phone, sending or receiving electronic mail, making purchases online and so on. In such applications, security is important. For instance, in the case of an online purchase, the right amount of money has to be paid without leaking the buyer personal information to outside parties. Communication protocols are the rules that govern these interactions. In order to make sure that they guarantee a certainlevel of security, it is desirable to analyze them. Doing so manually or by testing them is not enough, as attacks can be quite subtle. Some protocols have been used for years before an attack was discovered. Because of their increasing ubiquity in many important applications, e.g. electronic commerce, a very important research challenge consists in developing methods and verification tools to increase our trust on security protocols, and so on the applications that rely on them. For example, more than 28 billion Euros were spent in France using Internet transactions, and the number is growing. Moreover, new types of protocols are continuously appearing in order to face new technological and societal challenges, e.g. electronic voting, electronic passport to name a few.

Page generated in 0.0471 seconds