Sciweavers

4330 search results - page 44 / 866
» Analyzing security architectures
Sort
View
CCS
2005
ACM
14 years 28 days ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
CSFW
2009
IEEE
13 years 11 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
ICSEA
2008
IEEE
14 years 1 months ago
Analyzing Software Evolvability of an Industrial Automation Control System: A Case Study
Evolution of software systems is characterized by inevitable changes of software and increasing software complexity, which in turn may lead to huge maintenance and development cos...
Hongyu Pei Breivold, Ivica Crnkovic, Rikard Land, ...
WICSA
2008
13 years 8 months ago
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory
Software modularization activities remain without the guidance of formal theories and models. According to Baldwin and Clark's [1] design rule theory (DRT) , modular architec...
Matthew J. LaMantia, Yuanfang Cai, Alan MacCormack...
MOBISYS
2009
ACM
14 years 8 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...