Sciweavers

101 search results - page 14 / 21
» On the Use of Formal Techniques for Analyzing Dependable Rea...
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 7 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
ANSS
2007
IEEE
14 years 1 months ago
The Impact of the Mobility Model on Delay Tolerant Networking Performance Analysis
— Delay tolerant networks (DTNs) are a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. The topological impairments ex...
Muhammad Abdulla, Robert Simon
APN
2009
Springer
14 years 2 months ago
ASAP: An Extensible Platform for State Space Analysis
The ASCoVeCo State space Analysis Platform (ASAP) is a tool for performing explicit state space analysis of coloured Petri nets (CPNs) and other formalisms. ASAP supports a wide ra...
Michael Westergaard, Sami Evangelista, Lars Michae...
BCS
2008
13 years 8 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
SAC
2004
ACM
14 years 25 days ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White