Sciweavers

208 search results - page 14 / 42
» Automated Security Protocol Analysis With the AVISPA Tool
Sort
View
MMNS
2000
98views Multimedia» more  MMNS 2000»
14 years 11 months ago
Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services
: Growing dependence of commerce, industry and academia on the Internet underlines importance of analyzing its behavior. Changing Internet structure makes the gathered data quickly...
Selim Gurun, Boleslaw K. Szymanski
74
Voted
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 3 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
63
Voted
ENTCS
2008
110views more  ENTCS 2008»
14 years 9 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
14 years 9 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
DISCEX
2003
IEEE
15 years 2 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker