Sciweavers

3504 search results - page 94 / 701
» Secure protocol composition
Sort
View
104
Voted
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 4 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
GLOBECOM
2008
IEEE
15 years 2 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
128
Voted
FORTE
2007
15 years 4 months ago
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
Abstract. We present and discuss a formal, high-level approach to the specification and composition of interaction protocols for service-oriented systems. This work is being develo...
João Abreu, Laura Bocchi, José Luiz ...
149
Voted
FORMATS
2010
Springer
15 years 18 days ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan
118
Voted
SAC
2009
ACM
15 years 9 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...