Sciweavers

49 search results - page 3 / 10
» Model-Based Testing of Cryptographic Protocols
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
13 years 7 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
CCS
2008
ACM
13 years 10 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
ICST
2008
IEEE
14 years 3 months ago
Model-Based Quality Assurance of Windows Protocol Documentation
Microsoft is producing high-quality documentation for Windows client-server and server-server protocols. Our group in the Windows organization is responsible for verifying the doc...
Wolfgang Grieskamp, Nicolas Kicillof, Dave MacDona...
SEFM
2007
IEEE
14 years 2 months ago
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods
Various research prototypes and a well-founded theory of model based testing (MBT) suggests the application of MBT to real-world problems. In this article we report on applying th...
Bernhard K. Aichernig, Bernhard Peischl, Martin We...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet