Sciweavers

2162 search results - page 23 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CCS
2010
ACM
13 years 8 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
CN
2010
89views more  CN 2010»
13 years 8 months ago
Vulnerability analysis of RFID protocols for tag ownership transfer
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
CN
2006
99views more  CN 2006»
13 years 8 months ago
An analysis of convergence delay in path vector routing protocols
Dan Pei, Beichuan Zhang, Daniel Massey, Lixia Zhan...
CSSE
2006
IEEE
13 years 8 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
ENTCS
2006
89views more  ENTCS 2006»
13 years 8 months ago
Towards a Quantitative Analysis of Security Protocols
Pedro Adão, Paulo Mateus, Tiago Reis, Luca ...