The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a novel open access resource, the machine-readable phonetic dictionary for Romanian — MaRePhoR. It contains over 70,000 word entries, and their manually performed phonetic transcription. The paper describes the dictionary format and statistics, as well as an initial use of the phonetic transcription entries by building a grapheme to phoneme converter based on decision trees....
In the classical approaches of model checking (explicit and symbolic), the tools encode the state space, as well as the transition relation between the states. This way, when the predecessor of a state is needed, as in the case of CTL formulas evaluation, it can be extracted from the state space in a straightforward manner. Practical experience indicates that renouncing at encoding the transition...
Model checking has proved to be a very useful formal verification technique in the design of communication and security protocols. Researches have used it to validate the communications protocols from the point of view of their functional and security specifications. Over the years, model checking has evolved from explicit encoding of the state space to symbolic encoding, thus overcoming the state...
Model-based testing is an approach capable of providing one of the highest automation degree for the testing process. But its success depends on the validity of the model. One of the factors that contributes to developing valid models is the specification language used for this task. This paper presents a work in progress regarding the proposal of a new domain specific language for ad hoc networks...
Ad hoc networks represent a very modern technology for providing communication between devices without the need of any prior infrastructure set up, and thus in an “on the spot” manner. But there is a catch: so far there isn't any security scheme that would suit the ad hoc properties of this type of networks and that would also accomplish the needed security objectives. The most promising proposals...
Modeling and verifying the security protocols for ad hoc networks is a very complex task, because this type of networks is very complex. In this paper we present a new approach: the use of algebraic Petri nets as implemented by AlPiNA tool to model ad hoc networks and to verify some of the security properties of ARAN ad hoc secure routing protocol. The results we have obtained are in concordance with...
So far, model checkers cannot be used to verify the properties of complex systems, because of the state space explosion. Such systems are for instance the security protocols designed for ad hoc networks. But by limiting the parameters that are taken into consideration for the systems, the model checkers can be used as testing tools of the constructed models. In this paper we present how AlPiNA, a...
Ad hoc networks represent a promising communication technology that targets the ensuring of connectivity in special scenarios in which dedicated infrastructure cannot be used. The core of ad hoc networks is represented by the ad hoc routing protocols. These routing protocols raise specific security aspects that need to be taken care of. Many propositions of secure ad hoc routing protocols had been...
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification...
Research in security of ad hoc networks consists mainly of classifications and new protocol propositions. But formal verification should also be used in order to be able to prove the properties intended for the protocols. In this paper we present our work in formally verifying the group password-based authenticated key exchange protocol proposed in 2000 by Asokan and Ginzboorg. The proposition is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.