Sciweavers

2162 search results - page 51 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
IADIS
2003
13 years 10 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
MASCOTS
1998
13 years 10 months ago
Simulation-based 'STRESS' Testing Case Study: A Multicast Routing Protocol
In this work, we propose a method for using simulation to analyze the robustness of multiparty (multicastbased) protocols in a systematic fashion. We call our method Systematic Te...
Ahmed Helmy, Deborah Estrin
COMSIS
2006
100views more  COMSIS 2006»
13 years 8 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
JLP
2008
75views more  JLP 2008»
13 years 8 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 8 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli