RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...