Sciweavers

1059 search results - page 17 / 212
» Modeling Security Protocols as Games
Sort
View
ICSE
2009
IEEE-ACM
14 years 9 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
ASM
2008
ASM
15 years 1 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
MONET
2010
85views more  MONET 2010»
14 years 10 months ago
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ATAL
2011
Springer
13 years 11 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
INFOCOM
2006
IEEE
15 years 5 months ago
Repeated-Game Modeling of Multicast Overlays
— This paper studies multicast application overlay networks in a repeated-game framework. In these overlays, users have both the motivation and the means to alter their position...
Mike Afergan, Rahul Sami