In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirement...
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes...
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
: Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses ...
For the emerging ambient environments, in which interconnected intelligent devices will surround us to increase the comfort of our lives, fault tolerance and security are of paramo...