Sciweavers

5423 search results - page 32 / 1085
» Denial-of-service in automation systems
Sort
View
127
Voted
CADE
2010
Springer
15 years 3 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
78
Voted
GRID
2008
Springer
15 years 3 months ago
Automated performance control in a virtual distributed storage system
H. Howie Huang, Andrew S. Grimshaw