Sciweavers

718 search results - page 8 / 144
» Security protocols, properties, and their monitoring
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 6 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
IEEEARES
2010
IEEE
15 years 6 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
CSFW
2007
IEEE
15 years 6 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
DSN
2007
IEEE
15 years 6 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
ICFEM
2003
Springer
15 years 4 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone