Sciweavers

2162 search results - page 3 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
IJISEC
2008
101views more  IJISEC 2008»
13 years 6 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
COMSUR
2011
218views Hardware» more  COMSUR 2011»
12 years 6 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
ENTCS
2006
145views more  ENTCS 2006»
13 years 6 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
DOCENG
2009
ACM
13 years 4 months ago
A REST protocol and composite format for interactive web documents
John M. Boyer, Charles Wiecha, Rahul P. Akolkar
MASCOTS
2007
13 years 7 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy