Sciweavers

526 search results - page 78 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 2 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
CAV
2007
Springer
111views Hardware» more  CAV 2007»
13 years 11 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu