Sciweavers

2162 search results - page 164 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 10 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
COMCOM
2004
148views more  COMCOM 2004»
13 years 10 months ago
Hierarchical analysis of RealMedia streaming traffic on an IEEE 802.11b wireless LAN
The popularity of multimedia streaming on the Internet, combined with the growing deployment of wireless access networks, augurs the converging usage of these two technologies in ...
Tianbo Kuang, Carey L. Williamson
IMC
2010
ACM
13 years 8 months ago
Measurement and analysis of real-world 802.11 mesh networks
Despite many years of work in wireless mesh networks built using 802.11 radios, the performance and behavior of these networks in the wild is not well-understood. This lack of und...
Katrina LaCurts, Hari Balakrishnan
ICSE
2008
IEEE-ACM
14 years 10 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
CCS
2001
ACM
14 years 2 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel