Sciweavers

526 search results - page 15 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
Security Approaches for Cluster Interconnection in a Wireless Sensor Network
Abstract. A wireless sensor network is a collection of devices limited in lowpowered batteries, processing, communication bandwidth capabilities and low memory availability. Due to...
Alexandre Gava Menezes, Carlos Becker Westphall
JCP
2006
135views more  JCP 2006»
13 years 7 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
DBSEC
2008
89views Database» more  DBSEC 2008»
13 years 9 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa