Sciweavers

3972 search results - page 14 / 795
» Design of the iSCSI Protocol
Sort
View
POST
2012
181views more  POST 2012»
12 years 3 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
TPDS
1998
71views more  TPDS 1998»
13 years 7 months ago
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability
—Rollback-Dependency Trackability (RDT) is a property that states that all rollback dependencies between local checkpoints are on-line trackable by using a transitive dependency ...
Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
RFIDSEC
2010
13 years 6 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Design and Verification of Communication Protocols for Peer-to-Peer Multimedia Systems
This paper addresses issues pertaining to the necessity of utilizing formal verification methods in the design of protocols for peer-to-peer multimedia systems. These systems req...
Senem Velipasalar, Chang Hong Lin, Jason Schlessma...
IAT
2010
IEEE
13 years 5 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis