Sciweavers

4305 search results - page 24 / 861
» Analysing Protocol Implementations
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
ICDCS
2007
IEEE
14 years 3 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ISCC
2007
IEEE
14 years 3 months ago
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models. This paper shows how the last version o...
Alfredo Pironti, Riccardo Sisto
CLUSTER
2006
IEEE
14 years 2 months ago
Architecture and Implementation of Sockets Direct Protocol in Windows
Sockets Direct Protocol (SDP) is a byte stream protocol that utilizes the capabilities of the InfiniBand fabric to transparently achieve performance gains for existing socket-base...
Dror Goldenberg, Tzachi Dar, Gilad Shainer
ESORICS
2005
Springer
14 years 2 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld