Sciweavers

1653 search results - page 70 / 331
» Timed analysis of security protocols
Sort
View
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 2 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
ICCSA
2005
Springer
14 years 1 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
LPAR
2007
Springer
14 years 1 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
GLOBECOM
2007
IEEE
14 years 2 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis
TSE
2010
120views more  TSE 2010»
13 years 6 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...