Sciweavers

196 search results - page 14 / 40
» Formally Analysing a Security Protocol for Replay Attacks
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 10 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
SECURWARE
2008
IEEE
14 years 2 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 3 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
JCS
2006
157views more  JCS 2006»
13 years 8 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
IFIP
2009
Springer
14 years 3 months ago
Probable Innocence in the Presence of Independent Knowledge
Abstract. We analyse the C anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Und...
Sardaouna Hamadou, Catuscia Palamidessi, Vladimiro...