Sciweavers

671 search results - page 88 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ENTCS
2008
101views more  ENTCS 2008»
14 years 12 months ago
Improving Fault-based Conformance Testing
Fault-based conformance testing is a conformance testing strategy that relies on specific fault models. Previously, this mutation testing technique has been applied to protocol spe...
Bernhard K. Aichernig, Martin Weiglhofer, Franz Wo...
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 6 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
ICWS
2009
IEEE
15 years 9 months ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...
FC
2010
Springer
169views Cryptology» more  FC 2010»
15 years 3 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
IEEEARES
2009
IEEE
15 years 6 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang