Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Network Protocols (C.2.2) > Protocol Verification (C.2.2...)  
 
Options:
 
  1-10 of 20 Reviews about "Protocol Verification (C.2.2...)": Date Reviewed
  On effectiveness of mesh-based protocols for smart grid communication networks
Moulema P., Yu W., Xu G., Griffith D., Golmie N., Lu C., Su D. ACM SIGAPP Applied Computing Review 14(2): 59-70, 2014.  Type: Article

The smart grid relies on communication networks among millions of measuring devices, including remote terminal units (RTUs) and phasor measurement units (PMUs) in grid networks and smart meters on customer premises. Thus, building the ...

May 13 2015
  On the protocol composition logic PCL
Cremers C.  ASIACCS 2008 (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, Mar 18-20, 2008) 66-76, 2008.  Type: Proceedings

It has long been recognized that the analysis of the security of computing systems needs a formal basis to adequately argue about possibilities of attacks and the means to prevent them. A recent approach in this area is the protocol co...

Apr 9 2009
  Synchronizing Internet protocol security (SIPsec) (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 223 pp.  Type: Book (9780387327242)

This is the second book I have reviewed by this author. As with the previous book, this one has the organization and feel of an extended research paper. It discusses what the author refers to as synchronizing Internet protocol security...

Nov 9 2007
  Formal analysis of PIN block attacks
Steel G. Theoretical Computer Science 367(1): 257-270, 2006.  Type: Article

Steel’s paper deals with a very important topic, namely the attack strategies that hackers might carry out in order to crack seemingly secure encoded personal identification numbers (PINs). Since PINs are used in order to tra...

Jun 19 2007
  Using static analysis to validate the SAML single sign-on protocol
Hansen S., Skriver J., Nielson H.  Issues in the theory of security (Proceedings of the 2005 Workshop on Issues in the Theory of Security, Long Beach, California, Jan 10-11, 2005) 27-40, 2005.  Type: Proceedings

In this research paper, the authors study the Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) single sign-on (SSO) protocol in the framework of the LySa process cal...

May 5 2005
  Verifying protocols by model checking: a case study of the wireless application protocol and the model checker SPIN
He Y., Janicki R.  Collaborative research (Proceedings of the 2004 Conference of the Centre for Advanced Studies on Collaborative Research, Markham, Ontario, Canada, Oct 4-7, 2004) 174-188, 2004.  Type: Proceedings

This paper discusses a case study on the formal verification of a realistic and useful protocol, in the wireless applications domain. The protocol considered is the wireless transaction protocol (WTP) of wireless application protocol (...

Feb 8 2005
  A dynamic protocol conformance test method
Kim M., Yoo S., Park J., Kang S., Hyun S., Lee H. Journal of Systems and Software 67(1): 31-43, 2003.  Type: Article

Formal verification tools are useful in distinguishing faulty from correct implementations of the same protocol, which are both supposed to follow a commonly agreed upon specification....

Nov 24 2003
  Using CSP to Detect Errors in the TMN Protocol
Lowe G., Roscoe B. IEEE Transactions on Software Engineering 23(10): 659-669, 1997.  Type: Article

The first successful application of general-purpose model-checking tools to analysis of the security of cryptographic protocols was achieved by the second author [1]. This paper is important in that it seems to be the first exposition ...

Aug 1 1998
  Structural analysis of protocol specifications and generation of maximal fault coverage conformance test sequences
Miller R., Paul S. IEEE/ACM Transactions on Networking 2(5): 457-470, 1994.  Type: Article

Miller and Paul address the problem of conformance testing of communication protocols specified as finite state machines. Specifically, they look at the generation of test sequences that can provide maximal fault coverage when testing ...

Apr 1 1996
  Specification and analysis of the SNR high-speed transport protocol
Lundy G., Tipici H. IEEE/ACM Transactions on Networking 2(5): 483-496, 1994.  Type: Article

A specification and analysis of the high-speed transport protocol SNR (named after its inventors, K. Sabnani, A. Netravali, and W. Roome) is presented. The analysis leads to some improvement proposals for SNR. The formal model used is ...

Jan 1 1996
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy