Sciweavers

297 search results - page 46 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
ERSHOV
2009
Springer
13 years 5 months ago
Applicability of the BLAST Model Checker: An Industrial Case Study
Model checking of software has been a very active research topic recently. As a result, a number of software model checkers have been developed for analysis of software written in ...
Emanuel Kolb, Ondrej Sery, Roland Weiss
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
IPSN
2005
Springer
14 years 1 months ago
Maximizing system lifetime in wireless sensor networks
Maximizing system lifetime in battery-powered wireless sensor networks with power aware topology control protocols and routing protocols has received intensive research. In the pa...
Qunfeng Dong
SAS
2000
Springer
13 years 11 months ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...
FSTTCS
2003
Springer
14 years 24 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh