Sciweavers

3751 search results - page 15 / 751
» Events in security protocols
Sort
View
RTCSA
1998
IEEE
13 years 12 months ago
Protocol Synthesis from Context-Free Processes Using Event Structures
In this paper, we propose a protocol synthesis method based on a partial order model (called event structures) for the class of context-free processes. First, we assign a unique n...
Akio Nakata, Teruo Higashino, Kenichi Taniguchi
ACMSE
2007
ACM
13 years 11 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
GI
2007
Springer
14 years 1 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 7 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
WORDS
2002
IEEE
14 years 16 days ago
Schedulability Analysis of an Event-Based Real-Time Protocol Framework
This paper presents a method to analyze the timing behavior of an event-based real-time protocol composition framework. The framework, called RT-Appia, allows the development and ...
João Rodrigues, João Ventura, Lu&iac...