Sciweavers

3088 search results - page 139 / 618
» Multichannel Security Protocols
Sort
View
CASCON
2006
98views Education» more  CASCON 2006»
13 years 10 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight
CN
2010
83views more  CN 2010»
13 years 8 months ago
Secure peer sampling
PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random ...
Gian Paolo Jesi, Alberto Montresor, Maarten van St...
PST
2004
13 years 10 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
ATAL
2005
Springer
14 years 2 months ago
Untraceability of mobile agents
In the article we present two untraceability protocols for mobile agents. Comparing to other solutions, the advantage of the protocols is that they support agent’s autonomy in c...
Rafal Leszczyna, Janusz Górski
LPAR
2005
Springer
14 years 2 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...