Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed …
M Eian, SF Mjølsnes - Proceedings of the 3rd ACM SOSP workshop on …, 2011 - dl.acm.org
Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service …
Due to the dramatic increase in intrusion activities, the definition and evaluation of software security requirements have become important aspects of the development of software …
C Meadows - Science of Computer Programming, 2004 - Elsevier
The application of formal methods to cryptographic protocol analysis has been a growth area recently. Most of the attention has been paid to the design of languages for the …
A Merlin, G Hains - Electronic Notes in Theoretical Computer Science, 2005 - Elsevier
The CCS (Calculus of Communicating System) process algebra is a well-known formal model of synchronization and communication, useful for the analysis of safety and liveness …
A Merlin, G Hains - Computer Languages, Systems & Structures, 2007 - Elsevier
The calculus of communicating systems (CCS) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and …
B Meng, W Huang, Z Li - J. Comput., 2013 - jcomputers.us
The huge damage of denial of service attacks in security protocols attracts researchers' attention and effort to analysis, verification and prevention of denial of service attacks. In …
B Meng, W Wang, W Chen - J. Comput., 2012 - jcomputers.us
Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an important role in remote voting protocols. Recently Meng et al …