Sciweavers

1059 search results - page 100 / 212
» Modeling Security Protocols as Games
Sort
View
87
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 7 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
108
Voted
EWSN
2004
Springer
16 years 2 days ago
Max-Min Length-Energy-Constrained Routing in Wireless Sensor Networks
We consider the problem of inter-cluster routing between cluster heads via intermediate sensor nodes in a hierarchical sensor network. Sensor nodes having limited and unreplenishab...
Rajgopal Kannan, Lydia Ray, Ramaraju Kalidindi, S....
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 2 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
100
Voted
FM
2005
Springer
125views Formal Methods» more  FM 2005»
15 years 6 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
15 years 6 months ago
A game theoretic approach to provide incentive and service differentiation in P2P networks
Traditional Peer-to-Peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can easily access information without contributing any ...
Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, D...