Sciweavers

2162 search results - page 108 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
GLOBECOM
2007
IEEE
14 years 3 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis
FOSSACS
2004
Springer
14 years 2 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
INFOCOM
2003
IEEE
14 years 2 months ago
Analysis on Packet Resequencing for Reliable Network Protocols
Abstract— Protocols such as TCP require packets to be accepted (i.e., delivered to the receiving application) in the order they are transmitted at the sender. Packets are sometim...
Ye Xia, David N. C. Tse
CSFW
2000
IEEE
14 years 1 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker