Sciweavers

4305 search results - page 176 / 861
» Analysing Protocol Implementations
Sort
View
ESAS
2006
Springer
14 years 25 days ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
INFOCOM
2010
IEEE
13 years 7 months ago
Designing a Practical Access Point Association Protocol
—In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily influences the performance of its own and others. Through theoretical analysis, we ...
Fengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan,...
MOBISEC
2009
Springer
14 years 3 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
14 years 3 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...
LPAR
2007
Springer
14 years 3 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...