Sciweavers

1059 search results - page 17 / 212
» Modeling Security Protocols as Games
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
ASM
2008
ASM
13 years 9 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
MONET
2010
85views more  MONET 2010»
13 years 6 months ago
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ATAL
2011
Springer
12 years 7 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
INFOCOM
2006
IEEE
14 years 1 months ago
Repeated-Game Modeling of Multicast Overlays
— This paper studies multicast application overlay networks in a repeated-game framework. In these overlays, users have both the motivation and the means to alter their position...
Mike Afergan, Rahul Sami