Sciweavers

1101 search results - page 1 / 221
» On the Security and Vulnerability of PING
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 6 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 10 days ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
10
Voted
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
13 years 8 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
CIIT
2004
268views Communications» more  CIIT 2004»
13 years 6 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
AGENTS
2001
Springer
13 years 9 months ago
Communication decisions in multi-agent cooperation: model and experiments
Ping Xuan, Victor R. Lesser, Shlomo Zilberstein