Sciweavers

329 search results - page 24 / 66
» Complementing Computational Protocol Analysis with Formal Sp...
Sort
View
AINA
2006
IEEE
14 years 5 days ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
ENTCS
2010
82views more  ENTCS 2010»
13 years 8 months ago
A Strict-Observational Interface Theory for Analysing Service Orchestrations
Service oriented computing is an accepted architectural style for developing large, distributed software systems. A particular promise of such architectures is service orchestrati...
Philip Mayer, Andreas Schroeder, Sebastian S. Baue...
MICRO
2005
IEEE
117views Hardware» more  MICRO 2005»
14 years 2 months ago
A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation
Recent experimental advances have demonstrated technologies capable of supporting scalable quantum computation. A critical next step is how to put those technologies together into...
Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cr...
PERCOM
2007
ACM
14 years 8 months ago
Defining Strong Privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is threefold: (1) We propose a simple, formal definition of strong privacy usef...
Ari Juels, Stephen A. Weis
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 9 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora