Sciweavers

1106 search results - page 62 / 222
» Automated Design of Security Protocols
Sort
View
LPAR
2007
Springer
14 years 4 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
IWCMC
2006
ACM
14 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
LCN
2007
IEEE
14 years 4 months ago
Modified Algorithms for Multilevel GRSB Protocol
— GRSB - Guaranteed, Reliable, Secure Broadcast - is a protocol that provides reliable and secure broadcast / multicast communications [1,2]. It can be implemented in many types ...
Mohammad Asadul Hoque, S. M. Iftekharul Amin, Md. ...
EATIS
2007
ACM
14 years 1 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
USENIX
2008
14 years 8 days ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker