Sciweavers

1362 search results - page 55 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
ASWEC
2006
IEEE
15 years 8 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
GLOBECOM
2007
IEEE
15 years 8 months ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
MMB
2001
Springer
141views Communications» more  MMB 2001»
15 years 6 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
ESANN
2008
15 years 3 months ago
Initialization mechanism in Kohonen neural network implemented in CMOS technology
An initialization mechanism is presented for Kohonen neural network implemented in CMOS technology. Proper selection of initial values of neurons' weights has a large influenc...
Tomasz Talaska, Rafal Dlugosz