Sciweavers

97 search results - page 9 / 20
» Some Timestamping Protocol Failures
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
LCN
2006
IEEE
14 years 1 months ago
ZONER: A ZONE-based Sensor Relocation Protocol for Mobile Sensor Networks
— In mobile sensor networks, self-deployment and relocation are two different research issues, both of which involve autonomous sensor movement. They share in most cases a common...
Xu Li, Nicola Santoro
SAINT
2007
IEEE
14 years 1 months ago
Peer-to-Peer Scheduling System with Scalable Information Sharing Protocol
In traditional job scheduling systems for the Grid, a single or a few machines handle information of all computing resources and scheduling tasks. This centralized approach is not...
Norihiro Umeda, Hidemoto Nakada, Satoshi Matsuoka
DSN
2007
IEEE
14 years 1 months ago
Emergent Structure in Unstructured Epidemic Multicast
In epidemic or gossip-based multicast protocols, each node simply relays each message to some random neighbors, such that all destinations receive it at least once with high proba...
Nuno Carvalho, José Pereira, Rui Carlos Oli...
SAFECOMP
2007
Springer
14 years 1 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...