Sciweavers

4305 search results - page 43 / 861
» Analysing Protocol Implementations
Sort
View
ICMCS
2008
IEEE
164views Multimedia» more  ICMCS 2008»
14 years 3 months ago
A comparative study of network transport protocols for in-vehicle media streaming
We analyze and compare various transport protocols in the context of wireless in-vehicle IP-based audio and video communication. We determine the most appropriate transport protoc...
Mehrnoush Rahmani, Andrea Pettiti, Ernst Biersack,...
FUIN
2006
142views more  FUIN 2006»
13 years 8 months ago
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Abstract. We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of ...
Magdalena Kacprzak, Alessio Lomuscio, Artur Niewia...
IFIP
2009
Springer
14 years 3 months ago
Probable Innocence in the Presence of Independent Knowledge
Abstract. We analyse the C anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Und...
Sardaouna Hamadou, Catuscia Palamidessi, Vladimiro...
IJISEC
2008
101views more  IJISEC 2008»
13 years 8 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller