Sciweavers

4305 search results - page 63 / 861
» Analysing Protocol Implementations
Sort
View
DSOM
2006
Springer
14 years 16 days ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
FM
2009
Springer
154views Formal Methods» more  FM 2009»
13 years 6 months ago
Specification and Verification of Web Applications in Rewriting Logic
Abstract. This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through icating protocol abstracting HTTP. The propo...
María Alpuente, Demis Ballis, Daniel Romero
TMC
2010
137views more  TMC 2010»
13 years 3 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
APNOMS
2007
Springer
14 years 3 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
GLOBECOM
2009
IEEE
14 years 3 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...