-
1
-
-
38149106111
-
Formal modelling and analysis of DoS using probabilistic rewrite theories
-
Chicago
-
Agha, G., Greenwald, M., Gunter, C. A., Khanna, S., Meseguer, J., Sen, K., Thati, P. "Formal modelling and analysis of DoS using probabilistic rewrite theories", Proc. IEEE Work, on Foundations of Computer Security (FCS '05), Chicago, 2005.
-
(2005)
Proc. IEEE Work, on Foundations of Computer Security (FCS '05)
-
-
Agha, G.1
Greenwald, M.2
Gunter, C.A.3
Khanna, S.4
Meseguer, J.5
Sen, K.6
Thati, P.7
-
2
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Proc. Security Protocols Worksh, Cambridge
-
Aura, T., Nikander, P., Leiwo, J., "DOS-resistant authentication with client puzzles", Proc. Security Protocols Worksh., Cambridge, Springer LNCS 2133, 170-181, 2001.
-
(2001)
Springer LNCS
, vol.2133
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
3
-
-
38349029320
-
Intrusion Attack Tactics for the model checking of e-commerce security guarantees
-
Proc. 26th Int. Conf. on Computer Safety, Reliability and Security SAFECOMP
-
Basagiannis, S., Katsaros, P. and Pombortsis, A. "Intrusion Attack Tactics for the model checking of e-commerce security guarantees", Proc. 26th Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP), Springer LNCS 4680, 238-251, 2007.
-
(2007)
Springer LNCS
, vol.4680
, pp. 238-251
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
-
4
-
-
0020720357
-
On the security of public-key protocols
-
Dolev, D. and Yao, A. "On the security of public-key protocols", IEEE Trans. on Information Theory, 2 (29), 198-208, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.2
, Issue.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
5
-
-
35248833782
-
Revisiting liveness properties in the context of secure systems
-
st Int. Conf. Formal Aspects on Security
-
st Int. Conf. Formal Aspects on Security, Springer LNCS 2629, 203-211, 2003.
-
(2003)
Springer LNCS
, vol.2629
, pp. 203-211
-
-
Gärtner, F.1
-
6
-
-
3142619105
-
-
IETF, Network Working Group, Internet Draft, Feb
-
IETF - Network Working Group. Host Identity Protocol. Internet Draft, Feb. 2007.
-
(2007)
Host Identity Protocol
-
-
-
7
-
-
51949089353
-
-
Karn, P. and Simpson, A. Photuris: Session-key management protocol, RFC 2522, IETF Network Working Group, 1999.
-
Karn, P. and Simpson, A. Photuris: Session-key management protocol, RFC 2522, IETF Network Working Group, 1999.
-
-
-
-
8
-
-
34548060449
-
-
Kwiatkowska, M., Norman, G., Parker, D. Stochastic model checking, In: Formal Methods for the Design of Comp., Comm. & Software Systems: Performance Evaluation, Springer LNCS 4486, 220-270, 2007.
-
Kwiatkowska, M., Norman, G., Parker, D. "Stochastic model checking", In: Formal Methods for the Design of Comp., Comm. & Software Systems: Performance Evaluation, Springer LNCS 4486, 220-270, 2007.
-
-
-
-
10
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
IEEE Computer Society
-
Madan, B. B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K. S. "Modeling and quantification of security attributes of software systems", Proc. IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN 02), IEEE Computer Society, 2002.
-
(2002)
Proc. IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN 02)
-
-
Madan, B.B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
11
-
-
51949114498
-
-
InfraMP Project Web Site, http://infrahip.hiit.fi/, (last access: 21st of December 2007).
-
InfraMP Project Web Site, http://infrahip.hiit.fi/, (last access: 21st of December 2007).
-
-
-
-
12
-
-
0035075103
-
A cost-based framework for analysis of DoS in networks
-
Meadows, C. "A cost-based framework for analysis of DoS in networks", J. Comp. Security, 9, 143-164, 2001
-
(2001)
J. Comp. Security
, vol.9
, pp. 143-164
-
-
Meadows, C.1
-
14
-
-
26444499465
-
On statistical model checking of stochastic systems
-
Pro. 17th Int. Conf. on Computer Aided Verification CAV'05
-
Sen, K., Viswanathan, M., Agha, G. "On statistical model checking of stochastic systems", Pro. 17th Int. Conf. on Computer Aided Verification (CAV'05), Springer LNCS 3576, 266-288, 2000.
-
(2000)
Springer LNCS
, vol.3576
, pp. 266-288
-
-
Sen, K.1
Viswanathan, M.2
Agha, G.3
-
15
-
-
51949114307
-
Using Coloured Petri Nets to simulate DoS-resistant protocols
-
Denmark
-
Tritilanunt, S., Boyd, C., Foo, E., Gonzalez Neto, J. M. "Using Coloured Petri Nets to simulate DoS-resistant protocols", Proc. 7th Worksh. on Practical Use of Coloured Petri Nets & the CPN Tools, Un. of Aarhus, Denmark, 2006.
-
(2006)
Proc. 7th Worksh. on Practical Use of Coloured Petri Nets & the CPN Tools, Un. of Aarhus
-
-
Tritilanunt, S.1
Boyd, C.2
Foo, E.3
Gonzalez Neto, J.M.4
|