Sciweavers

1106 search results - page 79 / 222
» Automated Design of Security Protocols
Sort
View
ICLP
2009
Springer
14 years 5 months ago
An Overview of FORCES: An INRIA Project on Declarative Formalisms for Emergent Systems
Abstract. The FORCES project aims at providing robust and declarative formalisms for analyzing systems in the emerging areas of Security Protocols, Biological Systems and Multimedi...
Jesús Aranda, Gérard Assayag, Carlos...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 4 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
SASN
2003
ACM
14 years 4 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
CCS
2006
ACM
14 years 2 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
CCR
2004
94views more  CCR 2004»
13 years 11 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft