Sciweavers

2162 search results - page 156 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
SKG
2006
IEEE
14 years 4 months ago
Service Discovery Protocol in Wireless Sensor Networks
Sensor network is a novel technology about acquiring and processing information. This paper introduces the basic interaction patterns between requesters and providers of services ...
Xin-lian Zhou, Min Wu
CADE
2004
Springer
14 years 10 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
LPAR
2007
Springer
14 years 4 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
PERCOM
2007
ACM
14 years 9 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
WCRE
2007
IEEE
14 years 4 months ago
Dynamic Protocol Recovery
Dynamic protocol recovery tries to recover a component’s sequencing constraints by means of dynamic analysis. This problem has been tackled by several automaton learning approac...
Jochen Quante, Rainer Koschke