The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicular Ad-hoc Network (VANET) is a type of mobile communication in which topology changes dynamically due to high mobility of vehicles. Vehicles use two types of messages to update their status and to communicate with other vehicles. First is Periodic Safety Message (PSM) which gives us information about position, speed etc. and second is Event Driven Safety Message (ESM) which occurs when emergency...
In the area of formal analyzing of security protocols, more and more attention has been given to analyzing properties of fair exchange protocols such as non-repudiation and fairness. On the basis of analyzing the limitations of existing methods, this paper presents a new method to analyze fairness and non-repudiation, in which PLTL are used to describe non-repudiation and fairness, and the model-check...
Fair exchange protocols have been studied intensively in recent years. But a lot of methods are still performed manually. In this paper an automatic method is proposed for analyzing fair exchange protocols. In this method we formalize security properties of fairness and non-repudiation in TLA (temporal logic of action) and define common predicates to make the analysis automatic. An "end"...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.