Sciweavers

719 search results - page 75 / 144
» Proving Security Protocols Correct
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
IJNM
2008
112views more  IJNM 2008»
14 years 9 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
DEDS
2000
104views more  DEDS 2000»
14 years 9 months ago
Coordinated Decentralized Protocols for Failure Diagnosis of Discrete Event Systems
We address the problem of failure diagnosis in discrete event systems with decentralized information. We propose a coordinated decentralized architecture consisting of local sites ...
Rami Debouk, Stéphane Lafortune, Demostheni...
KBSE
2007
IEEE
15 years 4 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 2 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...