Sciweavers

4305 search results - page 166 / 861
» Analysing Protocol Implementations
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
ESORICS
2010
Springer
13 years 10 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
CONCUR
2010
Springer
13 years 9 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
DAC
2007
ACM
14 years 10 months ago
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow
A protocol for latency-insensitive design with early evaluation is presented. The protocol is based on a symmetric view of the system in which tokens carrying information move in ...
Jordi Cortadella, Michael Kishinevsky
PERCOM
2007
ACM
14 years 8 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer