Sciweavers

276 search results - page 4 / 56
» Model Checking Groupware Protocols
Sort
View
AINA
2004
IEEE
14 years 2 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 10 months ago
Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast
Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic mo...
Omar I. Al-Bataineh, Ron van der Meyden
ICDCSW
2000
IEEE
14 years 2 months ago
Games-Based Model Checking of Protocols: counting doesn't count
We introduce a technique that can be used to model the behaviour of protocols. In our model each process within a protocol belongs to a particular class. A set of rules governs th...
Tim Kempster, Colin Stirling, Peter Thanisch
IPPS
2007
IEEE
14 years 4 months ago
J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols
In this paper, we report our work [24, 26] on extending the J-Sim network simulator [13] to be an integrated environment for both simulation and model checking of network protocol...
Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, J...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 5 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...