Sciweavers

2162 search results - page 99 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
AFRICACRYPT
2009
Springer
14 years 3 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
14 years 3 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
PEWASUN
2006
ACM
14 years 2 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
ACISP
2005
Springer
14 years 2 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov