Sciweavers

297 search results - page 7 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
CCS
2010
ACM
13 years 7 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
ENTCS
2007
73views more  ENTCS 2007»
13 years 7 months ago
Language-Oriented Formal Analysis: a Case Study on Protocols and Distributed Systems
Carlos Bazílio, Edward Hermann Haeusler, Ma...
INFOCOM
2006
IEEE
14 years 1 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
ENTCS
2006
173views more  ENTCS 2006»
13 years 7 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 23 days ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty