Sciweavers

108 search results - page 1 / 22
» Failure Analysis of an E-Commerce Protocol Using Model Check...
Sort
View
SAFECOMP
2007
Springer
15 years 9 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
116
Voted
WECWIS
2000
IEEE
113views ECommerce» more  WECWIS 2000»
15 years 8 months ago
Failure Analysis of an E-Commerce Protocol Using Model Checking
Indrakshi Ray, Indrajit Ray
187
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 10 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
140
Voted
WISES
2003
15 years 4 months ago
Automatic Recovery of the TTP/A Sensor/Actuator Network
Abstract — Since sensor/actuator networks are to be used in error-prone environments, it is required that media access protocols for such networks are tolerant to failures. Field...
Wilfried Steiner, Wilfried Elmenreich
123
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts
With the rapid progress in science and technology, we find ubiquitous use of safety-critical systems in avionics, consumer electronics, and medical instruments. In such systems, u...
Yean-Ru Chen, Pao-Ann Hsiung, Sao-Jie Chen