Sciweavers

526 search results - page 12 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
ACSAC
1997
IEEE
13 years 11 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
ACSC
2007
IEEE
13 years 11 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
COMPSAC
2008
IEEE
14 years 1 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CORR
2011
Springer
146views Education» more  CORR 2011»
12 years 11 months ago
Exploratory simulation of an Intelligent Iris Verifier Distributed System
— This paper discusses some topics related to the latest trends in the field of evolutionary approaches to iris recognition. It presents the results of an exploratory experimenta...
Nicolaie Popescu-Bodorin, Valentina E. Balas
CASCON
2006
98views Education» more  CASCON 2006»
13 years 9 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight