Sciweavers

623 search results - page 83 / 125
» Declarative Network Verification
Sort
View
174
Voted
ESAS
2007
Springer
15 years 6 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
123
Voted
DSN
2004
IEEE
15 years 6 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
DAC
1991
ACM
15 years 6 months ago
REX - A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis
REX is a program that extracts parasitic resistance and capacitance values for nodes in VLSI layouts. REX also performs network serial and parallel simplifications. Two types of n...
Jerry P. Hwang
ESORICS
2010
Springer
15 years 3 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
CCS
2010
ACM
15 years 13 days ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin