Sciweavers

76 search results - page 6 / 16
» The art of the meta-aspect protocol
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 1 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
CSFW
2005
IEEE
14 years 1 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
ISORC
2007
IEEE
14 years 1 months ago
LSynD: Localized Synopsis Diffusion
Wireless sensor networks represent an extremely fastgrowing emerging technology, but still suffer from several limitations. The state of the art in sensor networks focuses on opti...
Andreea Berfield, Panos K. Chrysanthis, Daniel Mos...
EMNETS
2007
13 years 11 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens