Sciweavers

1653 search results - page 185 / 331
» Timed analysis of security protocols
Sort
View
124
Voted
CCS
2009
ACM
15 years 6 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
125
Voted
DATE
2009
IEEE
115views Hardware» more  DATE 2009»
15 years 9 months ago
Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources
—As multiprocessor systems are increasingly used in real-time environments, scheduling and synchronization analysis of these platforms receive growing attention. However, most kn...
Mircea Negrean, Simon Schliecker, Rolf Ernst
PSTV
1992
113views Hardware» more  PSTV 1992»
15 years 3 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
99
Voted
JCM
2007
76views more  JCM 2007»
15 years 2 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
103
Voted
ICDCSW
2003
IEEE
15 years 7 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako