Sciweavers

1123 search results - page 18 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
205
Voted
POPL
2009
ACM
16 years 11 days ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
ICNP
2007
IEEE
15 years 6 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
IWCMC
2006
ACM
15 years 5 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
IWSOS
2007
Springer
15 years 5 months ago
A New Approach to Adaptive Multi-routing Protocol for Mobile Ad Hoc Network
A routing protocol is designed considering a particular environment all the time which is not possible in the case of practical ad hoc networks. Because of the uncertainty in topol...
Ung Heo, Deepak G. C., Jaeho Choi
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 1 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...