Sciweavers

401 search results - page 13 / 81
» Formal Analysis of Meeting Protocols
Sort
View
ASWEC
2006
IEEE
15 years 5 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
CSFW
2012
IEEE
13 years 2 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
DKE
2007
107views more  DKE 2007»
14 years 11 months ago
Design time analysis of multiagent protocols
Interaction protocols enable agents to communicate with each other effectively. Whereas several approaches exist to specify interaction protocols, none of them has design tools t...
Pinar Yolum
ESORICS
2010
Springer
15 years 25 days ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
SIGSOFT
1998
ACM
15 years 4 months ago
Formal Modeling and Analysis of the HLA Component Integration Standard
An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards de ne rules of interaction and shared commun...
Robert Allen, David Garlan