Sciweavers

1365 search results - page 4 / 273
» Security applications of peer-to-peer networks
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
FI
2010
175views more  FI 2010»
13 years 4 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao