Sciweavers

453 search results - page 58 / 91
» On the complexity of exchanging
Sort
View
154
Voted
CSFW
2007
IEEE
15 years 10 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
DATE
2007
IEEE
125views Hardware» more  DATE 2007»
15 years 10 months ago
Simulation platform for UHF RFID
1 Developing modern integrated and embedded systems require well-designed processes to ensure flexibility and independency. These features are related to exchangeability of hardw...
Vojtech Derbek, Christian Steger, Reinhold Weiss, ...
IPPS
2007
IEEE
15 years 10 months ago
A Peer-to-Peer Infrastructure for Autonomous Grid Monitoring
Modern grids have become very complex by their size and their heterogeneity. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from ad...
Laurent Baduel, Satoshi Matsuoka
VTC
2007
IEEE
133views Communications» more  VTC 2007»
15 years 10 months ago
An Architecture for Situation-Aware Driver Assistance Systems
Current Driver Assistance Systems merely use a minimum set of information. By using additional information of the environment hazardous situations can be detected earlier, more re...
Matthias Röckl, Patrick Robertson, Korbinian ...
CCS
2007
ACM
15 years 10 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...