Sciweavers

329 search results - page 29 / 66
» Complementing Computational Protocol Analysis with Formal Sp...
Sort
View
ADHOCNOW
2009
Springer
13 years 9 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
SIGSOFT
2010
ACM
13 years 6 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
IPPS
2008
IEEE
14 years 2 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
DSOM
2005
Springer
14 years 1 months ago
Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Antonio Guerrero, Víctor A. Villagrá...
WIMOB
2007
IEEE
14 years 2 months ago
The Analysis of the Optimal Periodic Ranging Slot Number in IEEE 802.16 OFDMA Systems
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
Jihua Zhou, Xin Jin, Jiangtao Dong, Jinglin Shi, Z...