Sciweavers

3751 search results - page 56 / 751
» Events in security protocols
Sort
View
SAINT
2003
IEEE
14 years 3 months ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas
WISTP
2007
Springer
14 years 4 months ago
Optimistic Non-repudiation Protocol Analysis
Abstract. Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol...
Judson Santiago, Laurent Vigneron
ECRTS
2003
IEEE
14 years 3 months ago
Schedulability Analysis for Distributed Heterogeneous Time/Event Triggered Real-Time Systems
This paper deals with specific issues related to the design of distributed embedded systems implemented with mixed, event-triggered and time-triggered task sets, which communicate...
Traian Pop, Petru Eles, Zebo Peng
CCS
2008
ACM
13 years 12 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
ICITA
2005
IEEE
14 years 3 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang