Sciweavers

4305 search results - page 1 / 861
» Analysing Protocol Implementations
Sort
View
ISPEC
2009
Springer
14 years 9 days ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...
ISICT
2003
13 years 7 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
CCGRID
2005
IEEE
13 years 11 months ago
Version vector protocols implementing session guarantees
This paper analyses different protocols of session guarantees. Session guarantees (also known as client-centric consistency models) are one of the class of consistency models of r...
Anna Kobusinska, Cezary Sobaniec, Marek Libuda, Da...
CN
2004
128views more  CN 2004»
13 years 5 months ago
A smooth handoff scheme using IEEE802.11 triggers - design and implementation
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
POPL
2005
ACM
14 years 5 months ago
Inferring authentication tags
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...