In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...