Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
A Norta, R Matulevičius, B Leiding - Computers & Security, 2019 - Elsevier
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …
is a challenging task. Design flaws and missing specifications as well as security-and …
[图书][B] Recent advances in learning automata
This book is written for computer engineers, scientists, and students studying/working in
reinforcement learning and artificial intelligence domains. The book collects recent …
reinforcement learning and artificial intelligence domains. The book collects recent …
Relating state-based and process-based concurrency through linear logic (full-version)
I Cervesato, A Scedrov - Information and Computation, 2009 - Elsevier
This paper has the purpose of reviewing some of the established relationships between
logic and concurrency, and of exploring new ones. Concurrent and distributed systems are …
logic and concurrency, and of exploring new ones. Concurrent and distributed systems are …
A user-centric federated single sign-on system
Current identity management systems are not concerned with user privacy. Users must
assume that identity providers and service providers will ensure their privacy, which is not …
assume that identity providers and service providers will ensure their privacy, which is not …
Rechained: Sybil-resistant distributed identities for the Internet of Things and mobile ad hoc networks
Today, increasing Internet of Things devices are deployed, and the field of applications for
decentralized, self-organizing networks keeps growing. The growth also makes these …
decentralized, self-organizing networks keeps growing. The growth also makes these …
[PDF][PDF] Modeling and Analysis of Security Protocols Using Colored Petri Nets.
Y Xu, X Xie - J. Comput., 2011 - academia.edu
Security protocols are the basis of security in networks. Therefore, it is essential to ensure
that these protocols function correctly. However, it is difficult to design security protocols that …
that these protocols function correctly. However, it is difficult to design security protocols that …
[PDF][PDF] Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
In this paper, we present a technique to model and analyse cryptographic protocols using
coloured Petri nets. A model of the protocol is constructed in a top-down manner: rst the …
coloured Petri nets. A model of the protocol is constructed in a top-down manner: rst the …
Security verification of 802.11 i 4-way handshake protocol
J Liu, X Ye, J Zhang, J Li - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
Key management is a significant part of secure wireless communication. In IEEE 802. Hi
standard, 4-way handshake protocol is designed to exchange key materials and generate a …
standard, 4-way handshake protocol is designed to exchange key materials and generate a …
Performances evaluation and Petri nets
O Diallo, JJPC Rodrigues, M Sene - Modeling and Simulation of Computer …, 2015 - Elsevier
Petri nets have become a tremendously important mathematical and graphical tool in
modeling and performance evaluation of real systems with discrete events that are …
modeling and performance evaluation of real systems with discrete events that are …
[PDF][PDF] The M2X Economy–Concepts for Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices
B Leiding - 2019 - ediss.uni-goettingen.de
Nowadays, business transactions almost exclusively focus on human-to-human
transactions. The persistent growth and expansion of the Internet of Things, the …
transactions. The persistent growth and expansion of the Internet of Things, the …