The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security verification and performance analysis are both crucial aspects for designing effective and efficient authentication protocols. However, in most authentication protocol design practice, two independent models are often adopted for individual security verification and performance analysis, which could not guarantee that performance improvements taking no harm to its security functionalities...
Performance improvements are quite significant for a complex protocol, such as BitTorrent protocol, but should take no harm to its functionality correctness as an inevitable precondition. In current performance analysis studies, various formal models are usually utilized to perform corresponding evaluations. However, most of those models do not support specifying and verifying the functionality for...
It is very risky to improve the performance of network protocols without the assurance of its functional correctness, especially for protocols that with complicated and concurrent behaviors. However, in most of current model based protocol engineering projects, two independent models are adopted for individual functional verification and performance analysis, which could not guarantee the performance...
Hierarchical mobile management is designed to improve the performance of original Mobile IPv6 protocol. However, such improvements also introduce more complicated protocol behaviors. In order to effectively analyze the functionalities of this protocol, formal methods should be adopted. In this paper, a Colored Petri Nets (CPN) based formal model of Hierarchical Mobile IPv6 (HMIPv6) protocol is proposed...
Key management is a significant part of secure wireless communication. In IEEE 802. Hi standard, 4-way handshake protocol is designed to exchange key materials and generate a fresh pairwise key for subsequent data transmissions between the mobile supplicant and the authenticator. Due to several design flaws, original 4-way handshake protocol cannot provide satisfying security and performance. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.