Sciweavers

401 search results - page 27 / 81
» Formal Analysis of Meeting Protocols
Sort
View
LPAR
2005
Springer
14 years 4 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
EDCC
2010
Springer
14 years 3 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...
FMICS
2007
Springer
14 years 5 months ago
Analysis of a Session-Layer Protocol in mCRL2
Abstract. This paper reports the analysis of an industrial implementation of the session-layer of a load-balancing software system. This software comprises 7.5 thousand lines of C ...
Marko C. J. D. van Eekelen, Stefan ten Hoedt, Ren&...
ICALP
2004
Springer
14 years 4 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
PERCOM
2007
ACM
14 years 10 months ago
Fundamental Mobility Properties for Realistic Performance Analysis of Intermittently Connected Mobile Networks
Traditional mobile ad hoc routing protocols fail to deliver any data in Intermittently Connected Mobile Ad Hoc Networks (ICMN's) because of the absence of complete end-to-end ...
Apoorva Jindal, Konstantinos Psounis