Sciweavers

1106 search results - page 51 / 222
» Automated Design of Security Protocols
Sort
View
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
13 years 9 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
DELTA
2006
IEEE
14 years 4 months ago
Automation Integration with UPnP Modules
A method for leveraging a communication protocol called Universal Plug and Play (UPnP) for workcell automation and integration is presented. By leveraging UPnP for automation equi...
Swee M. Mok, Chi-haur Wu
DSD
2007
IEEE
119views Hardware» more  DSD 2007»
14 years 4 months ago
Online Protocol Testing for FPGA Based Fault Tolerant Systems
In this paper, the methodology for automated design of checker for communication protocol testing is presented. Based on the level of checking, different design strategies can be ...
Jiri Tobola, Zdenek Kotásek, Jan Korenek, T...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 3 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
CCS
2003
ACM
14 years 3 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld