Sciweavers

718 search results - page 113 / 144
» Operational Semantics of Security Protocols
Sort
View
DSOM
2003
Springer
14 years 2 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
CIIT
2004
268views Communications» more  CIIT 2004»
13 years 10 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
IJACT
2008
136views more  IJACT 2008»
13 years 9 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
JSAC
2008
95views more  JSAC 2008»
13 years 9 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
GLOBECOM
2007
IEEE
14 years 3 months ago
Service Oriented Architecture (SOA) for Integration of Field Bus Systems
—The current trends in service consolidation over Internet Protocol (IP) also stimulates the integration of the industrial automation system with the information technology (IT) ...
Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian