Sökning: "verification protocol"

Visar resultat 21 - 25 av 48 uppsatser innehållade orden verification protocol.

  1. 21. Verification of security protocols with state in ProVerif : Avoiding false attacks when verifying freshness

    Master-uppsats, KTH/Skolan för datavetenskap och kommunikation (CSC)

    Författare :Pasi Saarinen; [2015]
    Nyckelord :formal verification ProVerif state counter applied pi calculus freshness security protocols;

    Sammanfattning : One of the issues when attempting to verify security properties of a protocol is how to model the protocol. We introduce a method for verifying event freshness in tools which use the applied π-calculus and are able to verify secrecy. Event freshness can be used to prove that a protocol never generates the same key twice. LÄS MER

  2. 22. Small Model Theorems for Verification of Parameterized Systems

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Tomas Sävström; [2015]
    Nyckelord :Model Checking; Verificiation;

    Sammanfattning : The world of software is increasing and the requirements on software systems are getting harder. To ensure that these requirements are fulfilled, we use program verification. The goal of verification is to prove that the system automatically fulfills its requirements. In this thesis, we will consider parameterized systems. LÄS MER

  3. 23. BANDWIDTH AGGREGATION OF MOBILE BROADBAND LINKS ON RASPBERRY PI BASED ACCESS POINT

    Magister-uppsats, Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Författare :Lukas Chrast; Jozef Knaperek; Marek Kovalcik; [2014]
    Nyckelord :WiFi; Linux; Raspberry Pi; Point-to-Point Protocol; load balancing; iptables;

    Sammanfattning : This thesis is concerned with the usability of Raspberry Pi as the access point in the mobilebroadband network environment. The first part of the thesis is dedicated to Raspberry Pi itself;hardware required to set up WLAN and WAN; and to the analysis of suitable solutions forbandwidth aggregation, particularly the load balancing of mobile broadband connections andtheir aggregation into one logical link. LÄS MER

  4. 24. Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools

    Master-uppsats, KTH/Radio Systems Laboratory (RS Lab)

    Författare :Katharina Pfeffer; [2014]
    Nyckelord :security; authenticated key-exchange; 3GPP; LTE; formal methods; protocol verification; automated model checking; säkerhet; autentiserad etablering av nycklar; 3GPP; LTE; formella metoder; protokollverifiering; automatiserad modellverifiering;

    Sammanfattning : Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. LÄS MER

  5. 25. Safety requirements for monitoring and communicating operational data for vehicles in Intelligent Transport System

    Master-uppsats, KTH/Maskinkonstruktion (Inst.)

    Författare :Mathilde Simon; [2014]
    Nyckelord :;

    Sammanfattning : In the past few years, wireless technologies performances have been greatly improved to address various kinds of communications. However, in applications requiring the transmission of safety-critical data such as in industrial systems, wired solutions are still preferred to wireless networks. LÄS MER