Sciweavers

3504 search results - page 64 / 701
» Secure protocol composition
Sort
View
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
15 years 3 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
SAM
2004
151views Hardware» more  SAM 2004»
14 years 11 months ago
Checking Secrecy by Means of Partial Order Reduction
We propose a partial order reduction for model checking security protocols for the secrecy property. Based on this reduction we develop an automatic tool that can check security pr...
Cas J. F. Cremers, Sjouke Mauw
BROADNETS
2005
IEEE
15 years 3 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ISARCS
2010
188views Hardware» more  ISARCS 2010»
15 years 1 months ago
Component Behavior Synthesis for Critical Systems,
Abstract. Component-based architectures are widely used in embedded systems. For managing complexity and improving quality separation of concerns is one of the most important princ...
Tobias Eckardt, Stefan Henkler