Sciweavers

297 search results - page 7 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
CCS
2010
ACM
14 years 12 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
ENTCS
2007
73views more  ENTCS 2007»
14 years 11 months ago
Language-Oriented Formal Analysis: a Case Study on Protocols and Distributed Systems
Carlos Bazílio, Edward Hermann Haeusler, Ma...
INFOCOM
2006
IEEE
15 years 5 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
ENTCS
2006
173views more  ENTCS 2006»
14 years 11 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 4 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty