Sciweavers

2162 search results - page 132 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ADHOCNETS
2009
Springer
14 years 3 months ago
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Anna Förster, Alexander Förster, Amy L. ...
ACSAC
2005
IEEE
14 years 2 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
HOST
2009
IEEE
14 years 3 months ago
Analysis and Design of Active IC Metering Schemes
—Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design. Active hardware metering schemes try to...
Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Ve...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 3 months ago
Performance Analysis for Overlay Multicast on Tree and M-D Mesh Topologies
— Without the multicast support from the underlying networks, overlay multicast has the advantage of implementing inter-domain multicast communications. Usually, overlay multicas...
Wanqing Tu
CSFW
2002
IEEE
14 years 1 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...