Sciweavers

1362 search results - page 90 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
DRM
2004
Springer
15 years 9 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ACSAC
2009
IEEE
15 years 10 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
PADS
2005
ACM
15 years 9 months ago
Simulating Realistic Packet Routing without Routing Protocols
A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology. The routing decis...
George F. Riley, Dheeraj Reddy
SIMUTOOLS
2008
15 years 5 months ago
A simulation model of DYMO for ad hoc routing in OMNeT++
Mobile Ad Hoc Networks (MANETs) have evolved in the last years into standards in the communication world. By definition, they do not need any network infrastructure to facilitate ...
Christoph Sommer, Isabel Dietrich, Falko Dressler
CBSE
2008
Springer
15 years 5 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...