Dissertations / Theses on the topic 'PROTOCOL ANALYSIS'

To see the other types of publications on this topic, follow the link: PROTOCOL ANALYSIS.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'PROTOCOL ANALYSIS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.

Full text
Abstract:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.
"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Full text
Abstract:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desirable security features and a list of proofs that should be satisfied. We then present the results of the analysis. These results validate that the protocol does contain many security features and properties. They also help understand the security properties and identify areas where the protocol can be further secured. This led us to extend the design of the protocol to enhance its security. This thesis also presents a prototype implementation of SPP. Three software components were implemented. They are the Electronic Wallet component, the merchant software component and the Trusted Third Party component. The architecture and technologies that are required for implementation are discussed. The prototype is then used in performance measurement experiments. Results on system performance as a function of key size are presented. Finally, this thesis presents an extension of SPP to support a two buyer scenario. In this scenario one buyer makes an order while another buyer makes the payment. This scenario enables additional commerce services.
APA, Harvard, Vancouver, ISO, and other styles
3

O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.

Full text
Abstract:
Security protocols are important and widely used because they enable secure communication to take place over insecure networks. Over the years numerous formal methods have been developed to assist protocol designers by analysing models of these protocols to determine their security properties. Beyond the design stage however, developers rarely employ formal methods when implementing security protocols. This may result in implementation flaws often leading to security breaches. This dissertation contributes to the study of security protocol analysis by advancing the emerging field of implementation analysis. Two tools are presented which together translate between Java and the LySa process calculus. Elyjah translates Java implementations into formal models in LySa. In contrast, Hajyle generates Java implementations from LySa models. These tools and the accompanying LySa verification tool perform rapid static analysis and have been integrated into the Eclipse Development Environment. The speed of the static analysis allows these tools to be used at compile-time without disrupting a developer’s workflow. This allows us to position this work in the domain of practical software tools supporting working developers. As many of these developers may be unfamiliar with modelling security protocols a suite of tools for the LySa process calculus is also provided. These tools are designed to make LySa models easier to understand and manipulate. Additional tools are provided for performance modelling of security protocols. These allow both the designer and the implementor to predict and analyse the overall time taken for a protocol run to complete. Elyjah was among the very first tools to provide a method of translating between implementation and formal model, and the first to use either Java for the implementation language or LySa for the modelling language. To the best of our knowledge, the combination of Elyjah and Hajyle represents the first and so far only system which provides translation from both code to model and back again.
APA, Harvard, Vancouver, ISO, and other styles
4

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.
Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.

Full text
Abstract:
There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security. The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certain protocols could be ruled out. During the work, the platform’s backend was also developed, which needed to implement chosen web API protocols that would later be tested. The performed tests measured the APIs’ connection time and their response time with and without load. The results were analyzed and showed that the protocols had both pros and cons. Finally, a protocol was chosen that was suitable for the platform because it offered high security and fast connection. In addition, the server was not affected negatively by the number of connections. Reactive REST was the web API protocol chosen for this platform.
Det finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
APA, Harvard, Vancouver, ISO, and other styles
6

Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.

Full text
Abstract:
Many destinations throughout the world have developed events portfolios as a strategic initiative to attract tourists and their associated economic benefits. The ability of events to attract people to a destination for the purpose of attending the event is well documented. However the ability of an event to add value to attract tourists before or after the event is not so clear. In other words, can an events portfolio positively influence the decision to visit a destination at a time when none of the promoted events are scheduled? As a first step towards answering this important question, this study explores the contribution of an events portfolio to a consumer’s perceptions of a destination and how this influences their decision to attend a destination under these circumstances. The proposed study conducts a protocol analysis based on consumer’s decision-making thoughts. Each participant was given a choice between two destinations in India. Participants were asked to ‘think out loud’ as they made the decision to visit one of two possible destinations, one with an events portfolio and the other without. However, their visit does not coincide with the events’ dates. The results suggest four lines of reasoning utilised by prospective tourists in the destination choice process: 1) destination image; 2) the timing of the event with respect the time of visit; 3) tourists’ level of interest in the event; and, 4) events not listed in the events portfolio might be scheduled during the time of the proposed visit. In course of finding lines of reasoning for cross-cultural issues it was found that culture, architecture, English language usage, and food are the major aspects that tourists consider while travelling to Indian destinations. In terms of the events portfolio, there is evidence of a preference for a ‘fit’ between the event and Indian culture.
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.

Full text
Abstract:
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous scheduling MAC protocols minimize the preamble by combining preamble sampling and scheduling techniques; however, they do not prevent energy loss due to overhearing. In this dissertation, we present an energy efficient MAC protocol for WSNs, called AS-MAC, that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes. We also provide a multi-hop energy consumption model for AS-MAC. To validate our design and analysis, we implement the proposed scheme on the MICAz and TELOSB platforms. Experimental results show that AS-MAC considerably reduces energy consumption, packet loss and delay when compared with other energy efficient MAC protocols. For WLANs, we present a saturation throughput model for IEEE 802.11, the standard of WLAN, for a simple infrastructure scenario with hidden stations. Despite the importance of the hidden terminal problem, there have been a relatively small number of studies that consider the effect of hidden terminals on IEEE 802.11 throughput. Moreover, existing models are not accurate for scenarios with the short-term unfairness. In this dissertation, we present a new analytical saturation throughput model for IEEE 802.11 for a simple but typical infrastructure scenario with small number of hidden stations. Simulation results are used to validate the model and show that our model is extremely accurate. Lastly, we provide a saturation throughput model for IEEE 802.11 for the general infrastructure scenario with hidden stations. Simulation results show that this generalized model is reasonably accurate.
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA
This paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis." Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.

Full text
Abstract:
This study used protocol analysis to identify key variables in the venture capital investment decision-making process. The study used a fictional business plan which was based on six actual business plans. This fictional business plan was presented to ten venture capitalists who were asked to review it to decide whether to interview the investee. The protocols obtained from these subjects were analyzed to determine patterns within the subjects' review. The sections of the business plan which were commonly reviewed first were the deal structure, the executive summary, and the management section. The management section was used by the greatest number of subjects. The market section was used the greatest number of times. The data were also organized by type of operators used in each subject's protocols. Information Search/Retrieval operators were most common, followed by Task Structuring/Set Goal operators. When classified into the four major categories of Task Structuring/Set Goal, Information Acquisition, Analytical/ Inferential, and Choice operators, Analytical/Inferential operators were used most frequently. Choice operators were least used. The phrases were analyzed by the relevant section in the business plan. The market received the greatest number of references, followed by references to the product and to management. However, when references to the income statement and balance sheet were combined as phrases relevant to the financial statements, the financial statements were referred to more frequently than the product or the people. The subjects appeared to use an unidentified choice program within which certain models could be identified as subroutines. The subjects used an elimination-by-aspects model to screen the business plan. If the business plan met the criteria within the elimination-by-aspects model of the subject, the subject used an additive/nonlinear model for the remainder of the review. The results of this study indicate that financial statements provide information important in the venture capital investment decision-making process. This finding is contrary to the advice usually given to potential venture capital investees.
APA, Harvard, Vancouver, ISO, and other styles
12

Majeed, Adnan. "TARMAC timing analysis resilient MAC protocol /." Diss., Online access via UMI:, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Talkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Full text
Abstract:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its attempts to apply its web-based roots to a mobile atmosphere. To pinpoint protocol deficiencies, we first adapt a well regarded formal analysis and show it insufficient in the characterization of mobile applications, tying its transitional weaknesses to implementation issues and delivering a reanalysis of the proof. We then measure the prevalence of this weakness by statically analyzing over 11,000 Android applications. While looking through source code, we develop new methods to find sensitive protocol information, overcome hurdles like obfuscation, and provide interfaces for later modeling, all while achieving a false positive rate of below 10 percent. We then use network analysis to detect and verify application implementations. By collecting network traffic from Android applications that use OAuth, we produce a set of metrics that when fed into machine learning classifiers, can identify if the OAuth implementation is correct. The challenges include encrypted network communication, heterogeneous device types, and the labeling of training data.
APA, Harvard, Vancouver, ISO, and other styles
15

Firing, Tia Helene. "Analysis of the Transport Layer Security protocol." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.

Full text
Abstract:

In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.

APA, Harvard, Vancouver, ISO, and other styles
16

Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.

Full text
Abstract:
Reachability analysis is one of the earliest and most common techniques for protocol validation. It is well suited to checking the protocol syntactic properties since they are a direct consequence of the structure of the reachability tree. However, validations of unbounded protocols via reachability analysis always lead to the "state explosion" problem. To overcome this, a new approach in reachability analysis has been proposed by Vuong et al [Vuong 82a, 83a]. While not loosing any information on protocol syntactic properties, the Teachability tree constructed by the new approach for all non-FIFO and for a particular set of FIFO protocols (called well-ordered protocols) will become finite. This thesis is concerned with the implementation of an integrated package called VALIRA (VALIdation via Reachability Analysis) which bases on both the proposed technique and the conventional technique. Details and implementation of the various approaches used in VALIRA are presented in order to provide an insight to the package. Various features of the package are demonstrated with examples on different types of protocols, such as the FIFO, the non-FIFO, and the priority protocols. The use of VALIRA was found to be practical in general, despite some limitations of the package. Further enhancements on the VALIRA are also suggested.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
17

Hoffmeister, Chris W. "An evaluation methodology for protocol analysis systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FHoffmeister.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2007.
Thesis Advisor(s): George W. Dinolt, Jonathan Herzog. "March 2007." Includes bibliographical references (p. 237-239). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
18

Rasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.

Full text
Abstract:
TLS et SSH sont deux protocoles de sécurité très répandu et étudiés par la communauté de la recherche. Dans cette thèse, nous nous concentrons sur une classe spécifique de vulnérabilités affectant les implémentations TLS et SSH, tels que les problèmes de machine à états. Ces vulnérabilités sont dues par des différences d'interprétation de la norme et correspondent à des écarts par rapport aux spécifications, par exemple l'acceptation de messages non valides ou l'acceptation de messages valides hors séquence.Nous développons une méthodologie généralisée et systématique pour déduire les machines d'état des protocoles tels que TLS et SSH à partir de stimuli et d'observations, et pour étudier leur évolution au fil des révisions. Nous utilisons l'algorithme L* pour calculer les machines d'état correspondant à différents scénarios d'exécution.Nous reproduisons plusieurs vulnérabilités connues (déni de service, contournement d'authentification) et en découvrons de nouvelles. Nous montrons également que l'inférence des machines à états est suffisamment efficace et pratique dans de nombreux cas pour être intégrée dans un pipeline d'intégration continue, afin d'aider à trouver de nouvelles vulnérabilités ou déviations introduites au cours du développement.Grâce à notre approche systématique en boîte noire, nous étudions plus de 600 versions différentes d'implémentations de serveurs et de clients dans divers scénarios (versions de protocoles, options). En utilisant les machines d'état résultantes, nous proposons un algorithme robuste pour identifier les piles TLS et SSH. Il s'agit de la première application de cette approche sur un périmètre aussi large, en termes de nombre de piles TLS et SSH, de révisions ou de scénarios étudiés
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
APA, Harvard, Vancouver, ISO, and other styles
19

Khan, Muhammad Rashid. "Performance and route stability analysis of RPL protocol." Thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102884.

Full text
Abstract:
Wireless Sensor Networks are getting more deployed in dierent environment where they provide many bene ts for industrial and home automation, smart buildings, medical and environmental monitoring. Sensors are low cost devices with limited storage, computation, and power. Finding optimal based routing solutions is a challenging task in wireless sensor networks because of constraint over nodes and lossy links. The IETF Routing over Low power and Lossy network (ROLL) working group has recently developed the IPv6 based RPL routing protocol for Low power and Lossy Networks (LLNs). It is very important to evaluate the performance of RPL in order to make it relevant for real-world applications. Performance evaluations of RPL were already done in a simulation environment that does provide valuable results but cannot replace the real word experiments on real hardware devices. In the current implementation of RPL, Expected Transmission Count (ETX) is used as a metric to select the path from the sender nodes toward sink. Nodes select the parent with lower ETX value and changing their parent as the ETX metric has variation. This thesis aims to investigate the nodes parent changes under dierent inter-packet time intervals and transmission power with two dierent MAC layer duty cycling protocols ContikiMAC and X-MAC. In this thesis, we assess the impact of nodes parent changes on packet lost. We also investigate that based on a single metric ETX, nodes select accurate preferred parent that provide optimal path with higher packet delivery ratio. Experiments are performed on a real deployed test-bed. Experimental results reveal that the nodes in RPL based network changes their route toward the sink and frequent route changes have negative impact on the performance of sensor network.
APA, Harvard, Vancouver, ISO, and other styles
20

Bao, Wei. "Modeling, analysis and enhancement of transmission control protocol." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/36990.

Full text
Abstract:
Transmission control protocol (TCP) is one of the core protocols of the Internet protocol (IP) suite, which provides congestion control and reliable end-to-end connections in the Internet. In wireless environment, due to the random packet loss, many previous TCP variants primarily designed for wired networks may not perform well. In this thesis, we first analyze the impact of random packet loss on the throughput performance of TCP CUBIC. Then, by incorporating online network coding, we propose a new TCP variant called TCP Vegas with online network coding (TCP VON), which can be efficiently applied in wireless networks. In the first part of this thesis, we propose a Markov chain model to determine the steady state throughput of TCP CUBIC in wireless environment. The proposed model considers both congestion loss and random packet loss caused by the wireless environment. We derive the stationary distribution of the Markov chain and obtain the average throughput based on the stationary distribution. Simulations are carried out to validate the analytical model. In the second part of this thesis, we propose TCP Vegas with online network coding (TCP VON), which incorporates online network coding into TCP. TCP VON includes two mechanisms, namely congestion control and online network coding control. The congestion control is extended from TCP Vegas. For the online network coding control, the sender transmits redundant coded packets when packet losses happen. Otherwise, it transmits innovative coded packets. As a result, all the packets can be decoded consecutively and the average decoding delay is small. We establish a Markov chain model to compute the analytical delay performance of TCP VON. We also conduct ns-2 simulations to validate the proposed analytical models. Finally, we compare the average delay and throughput performance of TCP VON and automatic repeat request (ARQ) network coding based TCP (TCP ARQNC) for different topologies. Results show that TCP VON outperforms TCP ARQNC.
APA, Harvard, Vancouver, ISO, and other styles
21

Åhman, Stefan, and Marcus Wallstersson. "EVH2 protocol : Performance analysis and Wireshark dissector development." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98689.

Full text
Abstract:
EVH2 is a proprietary application layer protocol developed by Aptilo Networks and used in their software product. Currently the only way to inspect EVH2 traffic is by using their own application. This application inspects no traffic other than EVH2. Since Aptilo continuously develops this protocol it is important to see how changes in the protocol affect its performance. This thesis examines possible ways to facilitate the use and development of the protocol. To analyse EVH2 network traffic along with traffic from other protocols another approach is needed. Wireshark is an application capable of inspecting traffic of multiple protocols simultaneously and uses dissectors to decode each packet. This thesis describes the development and evaluation of a Wireshark plugin dissector for inspection of EVH2 traffic. Performance tests of EVH2 will provide feedback about protocol changes. This thesis creates a platform for performance evaluation by introducing a test suite for performance testing. A performance evaluation of EVH2 was conducted using the developed test suit.
EVH2 är ett proprietärt applikationslagerprotokoll utvecklat av Aptilo Networks som används i deras mjukvaruprodukt. För närvarande kan EVH2-trafik endast inspekteras med deras egenutvecklade applikation. Denna applikation har inte något stöd för att inspektera annan trafik än EVH2. Eftersom Aptilo kontinuerligt utvecklar detta protokollet är det viktigt att kunna se hur förändringar i protokollet påverkar dess prestanda. Detta examenarbete undersöker möjliga sätt att underlätta användningen och utvecklingen av protokollet. För att kunna inspektera EVH2-trafik tillsammans med trafik från andra protokoll behövs en annan lösning än den nuvarande. Wireshark är en applikation som har stöd för att inspektera flera protokoll samtidigt där protokollpaketen avkodas med dissectors (dissektorer översatt till svenska). I detta examensarbete beskrivs och utvärderas utvecklingen av ett Wireshark dissector plugin för inspektion av EVH2-trafik. Genom att prestandatesta EVH2 kan prestandaskillnader påvisas vid förändringar i protokollet. Detta examensarbete tar fram en plattform för prestandautvärdering genom att introducera en testsvit för prestandatestning. Den utvecklade testsviten användes för att utföra prestandtestning av EVH2.
APA, Harvard, Vancouver, ISO, and other styles
22

Kaphuka, Samuel. "The SADC protocol on trade: a critical analysis." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/19788.

Full text
Abstract:
"Is the SADC Trade Protocol adequate to meet its stated objectives and to address the problems of limited intra-SADC trade?" This thesis will argue that although the protocol has had some impact on intra-regional trade, some provisions contained within it remain a barrier to trade. The thesis will focus on how the SADC protocol on trade can address solve the problems of intra-SADC trade. It will be argued that certain provisions within the Protocol undermine the objectives of the protocol as outlined in Article 2. These provisions include but are not limited to the rules of origin, non-harmonization of external tariffs, derogations to the elimination of barriers in intra-SADC trade provisions found in Article 3, and inadequately tackling non-tariff measures. In examining the protocol, reference will be made to the similar provisions contained in the East African Community (EAC).
APA, Harvard, Vancouver, ISO, and other styles
23

Baker, Robert E. "A study of novice systems analysts' problem solving behaviors using protocol analysis." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Parel, Ilaria. "Validation and application of a shoulder ambulatory motion analysis protocol." Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8530.

Full text
Abstract:
2011/2012
Le principali attività di ricerca svolte durante il dottorato hanno riguardano la validazione e caratterizzazione dell’applicabilità di un protocollo per l’analisi della cinematica di spalla in ambito clinico (ISEO - INAIL Shoulder and Elbow Outpatient protocol). Lo scopo principale era quello di creare uno strumento che fornisse al personale sanitario informazioni sulla performance motoria dei pazienti, supportando, con informazioni di tipo quantitativo, la valutazione ambulatoriale delle patologie della spalla. E’ possibile suddividere l’attività di ricerca in tre temi principali: caratterizzazione e validazione di ISEO; applicazione di ISEO per valutazioni di tipo clinico; applicazione di ISEO per valutazione di performance motoria in ambito sportivo. Grazie ai processi di validazione e caratterizzazione svolti e alle applicazioni di ISEO, ad oggi il protocollo può essere utilizzato in studi clinici e sportivi riguardanti la cinematica di spalla (coordinazione scapolo-omerale), per i quali la sensibilità dello strumento può essere considerata adatta alle esigenze valutative.
The main research activities carried out during the PhD were related to the validation and characterization of the applicability of a protocol for the analysis of the kinematics of the shoulder in a clinical setting (ISEO - Shoulder and Elbow INAIL Outpatient protocol). The main purpose was to create a tool that provides quantitative information about the motor performance of patients, supporting clinicians for the assessment of ambulatory shoulder disorders. The research activity can be split in three main themes: characterization and validation od ISEO; application of ISEO for clinical assessments; application of ISEO for sport performance assessments. Thanks to the validation and characterization of the protocol and its application in several contests, it can be concluded that ISEO can be used to evaluate the kinematics of the shoulder (in particular the scapulohumeral coordination) in clinical and sport performance studies, for which the sensitivity of the protocol can be considered appropriate.
XXV Ciclo
1983
APA, Harvard, Vancouver, ISO, and other styles
25

Giancecchi, Nicola. "Analysis and Implementation of the Messaging Layer Security Protocol." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18467/.

Full text
Abstract:
The use of messaging services on smartphones has increased considerably in recent years, due to the growth in the availability of mobile devices and the evolution of communication technologies via Internet, factors that have effectively replaced the use of text messages. This increase also concerned the use in the business environment, a context where the exchange of confidential information is more frequent and therefore the need to protect communication between two or more people. This is important not only on a security point of view, but also for personal privacy. The major global players have responded by implementing security measures within their services, such as end-to-end encryption and increasingly strict rules regarding the processing of personal data. In this thesis we will illustrate Messaging Layer Security, shortened as MLS, a new protocol under development that guarantees security and efficiency in group conversations. When in a conversation between two clients, security can be ensured through end-to-end encryption and key exchange. The problem arises when multiple actors participate in the conversation asynchronously: in this case the computational effort is considerable, even more so considering the use of mobile devices with reduced battery capacity that does not guarantee the continuous presence of the online device. The thesis will deal with both the architectural part, that is more general and traces the outline of the subject, and the protocol part, more technical and detailed. Finally, an implementation of MLS written in Rust and called Melissa will be illustrated, which provides all the basic functionalities indicated in the draft 05 version of the protocol.
APA, Harvard, Vancouver, ISO, and other styles
26

Oruk, Tufan. "Simulation and analysis of a wireless MAC protocol : MACAW /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA320868.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1996.
Thesis advisor(s): Gilbert M. Lundy. "September 1996." Includes bibliographical references (p. 73). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
27

Tipici, H. Alphan. "Specification and analysis of a high speed transport protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA268941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ko, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.

Full text
Abstract:
This thesis addresses two major issues in protocol conformance testing: test sequence generation and test result analysis. For test sequence generation, a new approach based on the constraint satisfaction problem (CSP) techniques, which is widely used in the AI community, is presented. This method constructs a unique test sequence for a given FSM by using an initial test sequence, such as a transition tour or an UIO test sequence, and incrementally generating a set of test subsequences which together represent the constraints imposed on the overall structure of the FSM. The new method not only generates test sequence with fault coverage which is at least as good as the one provided by the existing methods, but also allows the implementation under test (IUT) to have a larger number of states than that in the specification. In addition, the new method also lends itself naturally to both test result analysis and fault coverage measurement. For test result analysis, the CSP method uses the observed sequence as the initial sequence, constructs all fault models which satisfy the initial sequence and introduces additional subsequences to pinpoint the IUT fault model. In addition, a second method for test result analysis is proposed, which is originated from a model of diagnostic reasoning from first principle, another well-known AI techniques which produces all minimal diagnoses by considering the overall consistency of the system together with the observation. Unlike the first method, the second method does not require the computation of all fault models explicitly, and hence is considered to be more suitable for large systems. To our knowledge, the proposed methods in this thesis represent the first attempt in applying AI techniques to the problem of protocol test sequence generation and analysis.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
29

Muriithi, Ndiritu. "Radio local area networks : protocol design and performance analysis." Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Carter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)." Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Amoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.

Full text
Abstract:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
APA, Harvard, Vancouver, ISO, and other styles
32

McLean, Alexander Brown. "Using an Acceptance and Commitment Training Protocol to Decrease Drug Use." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5375.

Full text
Abstract:
Behavior analysts have had much success in affecting behavior change with individuals diagnosed with intellectual disabilities as well as those who would be considered typically developing with a variety of intervention strategies; most of which involve affecting direct acting contingencies. However, the realm of language-based psychopathology has just begun to be addressed within the field through language based, or indirect acting strategies. Acceptance and Commitment Therapy (ACT) is based on the concept of derived stimulus relations and allows for a behavior analytic treatment of language-based psychopathology. The current study was intended to test the efficacy of a brief protocol-delivered ACT intervention with individuals who smoke marijuana. Oral swab drug screens were the primary dependent variable, along with the Acceptance and Action Questionnaire II (AAQ-II). All six ACT components were taught to each subject using a set list of metaphors and exercises and was assessed using a concurrent/non-concurrent multiple baseline across participants design. Results indicate that the brief protocol impacted levels of marijuana consumption with all three participants and that their self-reported levels of struggle (via the AAQ-II) lessened over the course of the training.
APA, Harvard, Vancouver, ISO, and other styles
33

Almquist, Martin Scott. "Formal specification and analysis of a wireless media access protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hensley, David P. "A formal specification and analysis of the resource reservation protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369656.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1999.
"September 1999". Thesis advisor(s): Gilbert M. Lundy. Includes bibliographical references (p. 55). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
35

Leong, Ieng Kit. "Formal analysis of Web Services Atomic Transaction protocol using SPIN." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.

Full text
Abstract:
Recent technological advances (such as digitization) and economic shifts (such as privatization and liberalization) have radically changed the telecommunications landscape.
Internet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
APA, Harvard, Vancouver, ISO, and other styles
37

Charbonneau, Lauren J. "A specification and analysis of the IEEE token bus protocol." Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30633.

Full text
Abstract:
Approved for public release, distribution is unlimited
In this thesis a formal description technique, systems of communicating machines, is used to specify and analyze a token bus protocol. A simplified description of the protocol is given, and proofs of certain correctness properties presented. The analysis proves that the protocol is free from deadlocks and non executable transitions, and also that successful message transfer is guaranteed for a network with an arbitrary number of machines. A program written in an object oriented language, C++, demonstrates that the description technique, the specification, and the analysis of the protocol is complete and accurate for a network of three stations. The specification is then extended to allow the transmission of different types of messages, errors in the communication channel, acknowledgements from the receiver, and timeouts.
APA, Harvard, Vancouver, ISO, and other styles
38

Khongpun, Somsook. "Composing processes of Thai high school students : a protocol analysis." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/862270.

Full text
Abstract:
This protocol-based case study research explored the general composing and thinking processes of five Thai EFL high school subjects who, while verbalizing their thoughts, composed in the first language (L1), Thai, and in the second language (L2), English. The composing sessions were audiotaped and videotaped; these tapes were then transcribed, translated, and coded for analysis, along with notes, drafts, and the written compositions.The L1/L2 protocol data yielded a number of interesting findings. Most subjects had a purpose in mind while composing their texts, but had little concern for the audience. Individually, each subject displayed a unitary composing style across languages, tending to compose in the Li and the L2 similarly, with minor variations. This suggests that composing knowledge and skills of the L1 were probably transferred to the composing in the L2.As a group, the subjects wrote the Li compositions in a similar manner, manifesting mental planning and reliance on internal resources, as they alternated among writing, repeating, and rehearsing. The L2 compositions gradually emerged with frequent repetitions and brief pauses, and the L2 composing processes seem to be constrained by the subjects' imperfect mastery of the L2.In addition, when they stumbled on L2 lexis, grammar, and mechanics, the subjects mainly employed the L1. Use of the L1 seemed to facilitate the subjects’ writing in the L2 a great deal. In both the L1 and the L2 compositions, the subjects tended to comment and repeat portions of texts in words, rehearse in phrases, and engage in other composing activities at the sentence level. The translated segments which occurred in the English protocols were at the phrase level.A tentative composing process model of these Thai EFL subjects is proposed; implications for EFL composition instruction and suggestions for further research are also provided.
Department of English
APA, Harvard, Vancouver, ISO, and other styles
39

Raiche, Carl A. "A specification and analysis of the IEEE token ring protocol." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Liang, Robert, Bruce Kwan, and Cedric Florens. "ON THROUGHPUT ANALYSIS OF THE MARS IN-SITU ARQ PROTOCOL." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/607709.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
Combating harsh and unpredictable channel environments is a part of the design of any in-situ communication system (i.e. rover to lander, rover to orbiter, etc.). Channel characteristics can range from simple additive white Gaussian noise (AWGN) channels to more bursty fading channels found in rover to orbiter links (i.e. canyon scenarios and typical orbiter passes around mountain ranges). A combination of forward error correction and automatic repeat request (ARQ) schemes are commonly used to provide a more robust communications link. ARQ enhances the communication link particularly for bursty fading channels. Go-Back-N is a commonly used ARQ scheme and is an option in the newly developed Consultative Committee for Space Data Systems (CCSDS) Proximity-1 Link protocol [7], a data link layer protocol targeted specifically for in-situ applications. Optimization of frame sizes and retransmission persistence of the ARQ scheme require a good analytical model of how the scheme performs over various channel conditions. In this paper, an analytical framework for modeling the COP-1 protocol is presented for both AWGN channels along with bursty fading channels. A Gilbert-Elliot two-state Markov model is used to model a bursty fading channel.
APA, Harvard, Vancouver, ISO, and other styles
41

Kulkarni, Upendra M. "Performance analysis of HDLC protocol operating in asynchronous balanced mode." Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/45897.

Full text
Abstract:

The objective of this work is to analyze the performance of HDLC Balanced Class of Procedures under saturated, full-duplex transmission on error prone links. This thesis extends work done by Bux et al. [8] by considering errors on both the links. Satellite links have long propogation delays compared to terrestrial links, and hence, have longer error recovery times. For such links, errors in acknowledgements have considerable impact on the throughput. In this analysis, the effect of errors in acknowledgements is taken in to consideration. An analytical approach is used to derive performance measures. The concept of "virtual transmission time" introduced by Bux et al is redefined to accommodate the effect of errors in acknowledgements and used in the analysis. Resulting throughput calculations show how various parameters, (e.g. transmission rate, propagation delay, error rate and packet size), interact and determine the performance.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
42

Li, Pan. "Capacity analysis and cross-layer protocol design in wireless networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Nelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol." Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Yunli. "Performance analysis and enhancement of MAC protocol for IEEE 802.11WLANs." Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1098856121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Maagh, Stefan. "Performance analysis of the HARQ dynamic decode-and-forward protocol." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8849.

Full text
Abstract:
The explosive growth of data traffic in wireless communication systems comes together with the urgent need to minimize its environmental and financial impact. Therefore, the main objective in the field of green radio communication is to improve the energy efficiency of wireless communication systems with respect to the future performance demands on the wireless communication infrastructure. In this context, recent research in cooperative and cognitive communication techniques attracts particular attention. While cognitive radio improves spectral efficiency by enhanced spectrum utilization, cooperative communication techniques achieve remarkable gains in spectral efficiency by enabling the terminals to share their resources. In particular, creating virtual multi-antenna arrays by antenna sharing enables exploitation of spatial diversity gains and multiplexing gains within a network of single antenna terminals. This technique is particularly attractive for mobile wireless networks, since power and space constraints often prohibit the integration of multiple antennas into mobile terminals. This work studies the performance of the hybrid automatic repeat-request (HARQ) dynamic decode-and-forward (DDF) protocol in the half-duplex relay channel. The reason behind exploration of the HARQ-DDF protocol is that it achieves the optimal performance in terms of the diversity-multiplexing tradeoff (DMT) and the diversity-multiplexing-delay tradeoff(DMDT). However, DMT and DMDT are evaluated as the signal-to-noise ratio (SNR) approaches infinity. In practice, key performance measures are the fixed-rate outage probability and delay-limited throughput achieved at the SNR expected during operation. To this end, it is common practice to give the performance of the DDF protocol as a function of the source-to-destination channel SNR (SD-SNR). In this dissertation the focus is to study the performance of the HARQ-DDF protocol measured as a function of the SNR as seen at the destination (D-SNR). This approach enables the performance comparison with the HARQ-SISO and the HARQ-MISO protocol from an energy efficiency perspective on the system level. Furthermore, a novel variant of the HARQ-MISO protocol, the hybrid repeat-with-diversity-request (HARDQ) MISO protocol, is introduced. Considering outage probability as measure of reliability, closed-form solutions and simulation results show that the HARDQ-MISO and the HARQ-DDF protocol outperform the HARQ-MISO protocol from an energy efficiency point of view. From a delay-limited throughput point of view the HARQ-MISO protocol is beneficial. It is demonstrated that code-rate assignment allows to achieve significant performance gains in terms of delay-limited throughput. Furthermore, reducing the decoding cost using code-rate assignment techniques comes together with only negligible performance loss.
APA, Harvard, Vancouver, ISO, and other styles
46

D'Silva, Anil J. "An analysis on the fairness aspects of the DQDB protocol." Thesis, Queensland University of Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Deng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.

Full text
Abstract:
Voice over IP (VoIP) is gaining more popularity in today‟s communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to mitigate denial of service attacks, only a small proportion has been specific to SIP. This project examines the way denial of service attacks affect the performance of a SIP-based system and two evolutionary solutions to this problem that build on each other are proposed with experimental results to demonstrate the effectiveness of each solution. In stage one, this project proposes the Security-Enhanced SIP System (SESS), which contains a security-enhanced firewall, which evolved from the work of stage one and a security-enhanced SIP proxy server. This approach helps to improve the Quality-of-Service (QoS) of legitimate users during the SIP flooding attack, while maintaining a 100 percent success rate in blocking attack traffic. However, this system only mitigates SIP INVITE and REGISTER floods. In stage two, this project further advances SESS, and proposes an Improved Security-Enhanced SIP System (ISESS). ISESS advances the solution by blocking other SIP request floods, for example CANCEL, OK and BYE flood. JAIN Service Logic Execution Environment (JAIN SLEE) is a java-based application server specifically designed for event-driven applications. JAIN SLEE is used to implement enhancements of the SIP proxy server, as it is becoming a popular choice in implementing communication applications. The experimental results show that during a SIP flood, ISESS cannot only drop all attack packets but also the call setup delay of legitimate users can be improved substantially compared to and unsecured VoIP system.
APA, Harvard, Vancouver, ISO, and other styles
48

Basaran, Cuneyt. "Automated network protocol reachability analysis with supertrace algorithm and TESTGEN : automated generation of test sequence for a formal protocol specification." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ondráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.

Full text
Abstract:
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
50

Robbins, Bryan Thomas. "Cognitive factors in perspective-based reading (PBR) a protocol analysis study /." Master's thesis, Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-161814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography