Sciweavers

526 search results - page 32 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
ICST
2008
IEEE
14 years 2 months ago
Model-Based Quality Assurance of Windows Protocol Documentation
Microsoft is producing high-quality documentation for Windows client-server and server-server protocols. Our group in the Windows organization is responsible for verifying the doc...
Wolfgang Grieskamp, Nicolas Kicillof, Dave MacDona...
POPL
2006
ACM
14 years 7 months ago
Verifying properties of well-founded linked lists
We describe a novel method for verifying programs that manipulate linked lists, based on two new predicates that characterize reachability of heap cells. These predicates allow re...
Shuvendu K. Lahiri, Shaz Qadeer
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
GI
2007
Springer
13 years 11 months ago
Agent-Based Container Security Systems: An Interdisciplinary Perspective
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...
Sven Werner, Arne Schuldt, Kateryna Daschkovska