Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/6920
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNandewal, A.
dc.contributor.authorMahendra, D.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T09:46:24Z-
dc.date.available2020-03-30T09:46:24Z-
dc.date.issued2016
dc.identifier.citationICACCS 2016 - 3rd International Conference on Advanced Computing and Communication Systems: Bringing to the Table, Futuristic Technologies from Arround the Globe, 2016, Vol., , pp.-en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/6920-
dc.description.abstractDenial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods. � 2016 IEEE.en_US
dc.titleSecurity protocol for distributed networks using formal method specificationen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.