Sciweavers

4305 search results - page 2 / 861
» Analysing Protocol Implementations
Sort
View
ASWEC
2006
IEEE
14 years 10 days ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
IANDC
2008
84views more  IANDC 2008»
13 years 4 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
ICAIL
2007
ACM
13 years 10 months ago
An implementation of norm-based agent negotiation
In this paper, we develop our previous outline of a multi-agent architecture for regulated information exchange in crime investigations. Interactions about information exchange be...
Pieter Dijkstra, Henry Prakken, Kees de Vey Mestda...
GLOBECOM
2008
IEEE
14 years 22 days ago
Performance Study of the NSIS QoS-NSLP Protocol
—This paper presents an evaluation of the Quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (Next Steps In Signalling) protocol suite. The QoS-NSLP in combinati...
Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, ...
ESORICS
2002
Springer
14 years 5 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe