Sciweavers

554 search results - page 52 / 111
» Verifying Security Protocols Modelled by Networks of Automat...
Sort
View
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
14 years 1 months ago
Performance Analysis Issues for Parallel Implementations of Propagation Algorithm
This paper presents a theoretical study to evaluate the performance of a family of parallel implementations of the propagation algorithm. The propagation algorithm is used to an i...
Leonardo Brenner, Luiz Gustavo Fernandes, Paulo Fe...
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
CNSR
2006
IEEE
136views Communications» more  CNSR 2006»
14 years 1 months ago
Combining Petri Nets and ns-2: A Hybrid Method for Analysis and Simulation
Network protocol performance and evaluation study is often carried out using a couple of widely used simulation toolkits, such as ns-2 and OPNET. These toolkits usually contain ma...
Qiang Ye, Mike H. MacGregor
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ADHOC
2008
146views more  ADHOC 2008»
13 years 8 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi