Sciweavers

4305 search results - page 92 / 861
» Analysing Protocol Implementations
Sort
View
CSFW
2002
IEEE
14 years 1 months ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather
CCR
2004
110views more  CCR 2004»
13 years 8 months ago
Analysis of long duration traces
This paper introduces a new set of long duration captures of Internet traffic headers. The capture is being performed on a continuous on-going basis and is approaching a year in d...
Richard Nelson, Daniel Lawson, Perry Lorier
COMPSAC
2009
IEEE
14 years 3 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
SERP
2003
13 years 10 months ago
A Maturity Model for the Implementation of Software Process Improvement
Different advances have been made in the development of software process improvement (SPI) standards and models, e.g. capability maturity model (CMM), more recently CMMI, and ISO...
Mahmood Niazi, David Wilson
USENIX
1994
13 years 10 months ago
Probing TCP Implementations
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
Douglas Comer, John C. Lin