Sciweavers

1116 search results - page 103 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
FUIN
2007
99views more  FUIN 2007»
13 years 8 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
CSFW
2009
IEEE
14 years 2 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
JUCS
2010
135views more  JUCS 2010»
13 years 2 months ago
Model-driven Transformation and Validation of Adaptive Educational Hypermedia using CAVIAr
Abstract: Authoring of Adaptive Educational Hypermedia is a complex activity requiring the combination of a range of design and validation techniques. We demonstrate how Adaptive E...
Mark Melia, Claus Pahl
MOBISEC
2009
Springer
14 years 2 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
USENIX
2003
13 years 9 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok