Sciweavers

14 search results - page 2 / 3
» Compositional Verification of a Third Generation Mobile Comm...
Sort
View
APN
2008
Springer
13 years 6 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
FM
2006
Springer
146views Formal Methods» more  FM 2006»
13 years 8 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
SIGSOFT
2007
ACM
14 years 5 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
VTC
2006
IEEE
179views Communications» more  VTC 2006»
13 years 11 months ago
An Efficient Handover Scheme Based on Fast Mobile IPv6
— Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3...
Shanthy Menezes, S. Venkatesan, Kwang-hyun Rho
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 5 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan