Sciweavers

1362 search results - page 111 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
152
Voted
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
15 years 9 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
132
Voted
WONS
2005
IEEE
15 years 9 months ago
Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery arch...
Paal Engelstad, Yan Zheng
125
Voted
RTSS
2003
IEEE
15 years 9 months ago
Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks
This paper presents a time division multiple access medium access control protocol for wireless sensor / actuator networks implemented with a contention-free message scheduler. A ...
Thomas W. Carley, Moussa A. Ba, Rajeev Barua, Davi...
169
Voted
COMCOM
2011
14 years 10 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
145
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt