Search
for Topics
All Reviews
Browse All Reviews
>
Computer Systems Organization (C)
>
Computer-Communication Networks (C.2)
>
Network Protocols (C.2.2)
> Protocol Verification (C.2.2...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 20 Reviews about "
Protocol Verification (C.2.2...)
":
Date Reviewed
On effectiveness of mesh-based protocols for smart grid communication networks
Moulema P., Yu W., Xu G., Griffith D., Golmie N., Lu C., Su D. ACM SIGAPP Applied Computing Review 14(2): 59-70, 2014. Type: Article
The smart grid relies on communication networks among millions of measuring devices, including remote terminal units (RTUs) and phasor measurement units (PMUs) in grid networks and smart meters on customer premises. Thus, building the ...
May 13 2015
On the protocol composition logic PCL
Cremers C. ASIACCS 2008 (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, Mar 18-20, 2008) 66-76, 2008. Type: Proceedings
It has long been recognized that the analysis of the security of computing systems needs a formal basis to adequately argue about possibilities of attacks and the means to prevent them. A recent approach in this area is the protocol co...
Apr 9 2009
Synchronizing Internet protocol security (SIPsec) (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 223 pp. Type: Book (9780387327242)
This is the second book I have reviewed by this author. As with the previous book, this one has the organization and feel of an extended research paper. It discusses what the author refers to as synchronizing Internet protocol security...
Nov 9 2007
Formal analysis of PIN block attacks
Steel G. Theoretical Computer Science 367(1): 257-270, 2006. Type: Article
Steel’s paper deals with a very important topic, namely the attack strategies that hackers might carry out in order to crack seemingly secure encoded personal identification numbers (PINs). Since PINs are used in order to tra...
Jun 19 2007
Using static analysis to validate the SAML single sign-on protocol
Hansen S., Skriver J., Nielson H. Issues in the theory of security (Proceedings of the 2005 Workshop on Issues in the Theory of Security, Long Beach, California, Jan 10-11, 2005) 27-40, 2005. Type: Proceedings
In this research paper, the authors study the Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) single sign-on (SSO) protocol in the framework of the LySa process cal...
May 5 2005
Verifying protocols by model checking: a case study of the wireless application protocol and the model checker SPIN
He Y., Janicki R. Collaborative research (Proceedings of the 2004 Conference of the Centre for Advanced Studies on Collaborative Research, Markham, Ontario, Canada, Oct 4-7, 2004) 174-188, 2004. Type: Proceedings
This paper discusses a case study on the formal verification of a realistic and useful protocol, in the wireless applications domain. The protocol considered is the wireless transaction protocol (WTP) of wireless application protocol (...
Feb 8 2005
A dynamic protocol conformance test method
Kim M., Yoo S., Park J., Kang S., Hyun S., Lee H. Journal of Systems and Software 67(1): 31-43, 2003. Type: Article
Formal verification tools are useful in distinguishing faulty from correct implementations of the same protocol, which are both supposed to follow a commonly agreed upon specification....
Nov 24 2003
Using CSP to Detect Errors in the TMN Protocol
Lowe G., Roscoe B. IEEE Transactions on Software Engineering 23(10): 659-669, 1997. Type: Article
The first successful application of general-purpose model-checking tools to analysis of the security of cryptographic protocols was achieved by the second author [1]. This paper is important in that it seems to be the first exposition ...
Aug 1 1998
Structural analysis of protocol specifications and generation of maximal fault coverage conformance test sequences
Miller R., Paul S. IEEE/ACM Transactions on Networking 2(5): 457-470, 1994. Type: Article
Miller and Paul address the problem of conformance testing of communication protocols specified as finite state machines. Specifically, they look at the generation of test sequences that can provide maximal fault coverage when testing ...
Apr 1 1996
Specification and analysis of the SNR high-speed transport protocol
Lundy G., Tipici H. IEEE/ACM Transactions on Networking 2(5): 483-496, 1994. Type: Article
A specification and analysis of the high-speed transport protocol SNR (named after its inventors, K. Sabnani, A. Netravali, and W. Roome) is presented. The analysis leads to some improvement proposals for SNR. The formal model used is ...
Jan 1 1996
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy