Sciweavers

2162 search results - page 19 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ADHOC
2011
13 years 3 months ago
Design and analysis of a propagation delay tolerant ALOHA protocol for underwater networks
Acoustic underwater wireless sensor networks (UWSN) have recently gained attention as a topic of research. Such networks are characterized by increased uncertainty in medium acces...
Joon Ahn, Affan A. Syed, Bhaskar Krishnamachari, J...
IFIP
2010
Springer
13 years 3 months ago
A Calculus for the Analysis of Wireless Network Security Protocols
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled ...
Francesco Ballardin, Massimo Merro
USS
2010
13 years 6 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
CCS
2006
ACM
14 years 11 days ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
JSAC
2008
92views more  JSAC 2008»
13 years 8 months ago
Multiuser diversity with capture for wireless networks: protocol and performance analysis
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
Justin Foo, Defeng Huang