Sciweavers

526 search results - page 62 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
FTDB
2011
98views more  FTDB 2011»
12 years 11 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...
FMICS
2006
Springer
13 years 11 months ago
Model-Based Testing of a WAP Gateway: An Industrial Case-Study
Abstract. We present experiences from a case study where a model-based approach to black-box testing is applied to verify that a Wireless Application Protocol (WAP) gateway conform...
Anders Hessel, Paul Pettersson
ENTCS
2008
118views more  ENTCS 2008»
13 years 7 months ago
The STSLib Project: Towards a Formal Component Model Based on STS
We present the current state of our STSLib project. This project aims at defining an environment to formally specify and execute software components. One important feature is that...
Fabrício Fernandes, Jean-Claude Royer
XMLSEC
2003
ACM
14 years 27 days ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh
EUROPAR
2008
Springer
13 years 9 months ago
Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Abstract. Security and fault-tolerance is a big issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. I...
Sébastien Varrette, Jean-Louis Roch, Guilla...