Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Comedia griega
6
Teatro griego
3
Clasificación
2
Identificación
2
Teatro español
2
Traducciones al español
2
Actuación teatral
1
Autores franceses
1
Avispas
1
Crítica e interpretación
1
Cuentos infantiles
1
Cuentos mexicanos
1
El único hospedante confirmado de L. hyalinus es Q. laeta
1
En campo se obtuvo una densidad promedio de 39.2 ± 9.69 capullos∙m-2
1
Estudio y enseñanza
1
Himenópteros
1
Historia y crítica
1
Ichneumonidae
1
In the open field, an average density of 39.2 ± 9.69 sawfly cocoons∙m -2 was recorded
1
L. hyalinus galls affect growth and shape of Quercus laeta crown
1
La generación sexual de Loxaulus hyalinus dura al menos ocho meses
1
Las agallas de L. hyalinus alteran el crecimiento y la forma de la copa de Quercus laeta
1
Lepidópteros
1
Literatura española
1
Los capullos fueron atacados por avispas (parasitoides) del género Exenterus
1
Los principales enemigos naturales de L. hyalinus son especies de Eurytomidae y de Synergus
1
Mitología griega
1
Pepper weevil
1
Picudo del chile
1
Pinus oaxacana
1
-
41“…We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
42“…We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
43“…Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
44“…Then, we use Burrows–Abadi–Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
45“…Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
46“…We analyze the security of SLUA-WSN through the informal and formal analysis, including Burrows–Abadi–Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Moreover, we compare the performance of SLUA-WSN with some existing schemes. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
47“…We prove the security of WSN-SLAP by using Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. In addition, we evaluate the performance of WSN-SLAP compared with existing related protocols. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
48por Khalid, Haqi, Hashim, Shaiful Jahari, Ahmad, Sharifah Mumtazah Syed, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
49por Adnan, Muhammad, Iqbal, Jawaid, Waheed, Abdul, Amin, Noor Ul, Zareei, Mahdi, Umer, Asif, Mohamed, Ehab Mahmoud“…The proposed security is validated through the well-known simulation tool AVISPA. Additionally, a formal security model is applied to validate the design hierarchic architecture’s fundamental security properties for SDVN in an efficient and desirable way. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
50Publicado 2020“…The proposed protocol exhibits all the necessary security properties required to protect the IoMT networks, like authentication, confidentiality, integrity, and anonymity. The formal AVISPA and informal security analysis demonstrate its robustness against attacks like impersonation, replay, a man in the middle, etc. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
51“…The brief security analysis using automated validation of internet security protocols and applications (AVISPA) tool shows that the proposed scheme can withstand all network attacks.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
52“…The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
53A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemspor Lin, Han-Yu“…To further ensure the practical application security, an automatic security validation tool called AVISPA is also adopted to analyze possible attacks and pitfalls of our designed protocol.…”
Publicado 2018
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
54“…Furthermore, we demonstrate that our scheme resists replay and man-in-the-middle attacks usingthe automated validation of internet security protocols and applications (AVISPA) simulation tool. Finally, we compare the performance and the security features of the proposed scheme with some existing schemes. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
55por Wazid, Mohammad, Das, Ashok Kumar, Shetty, Sachin, J. P. C. Rodrigues, Joel, Park, Youngho“…The detailed security analysis and formal security verification conducted by the widely used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
56“…We demonstrate that the proposed EHR system can prevent various attacks by using informal security analysis and automated validation of internet security protocols and applications (AVISPA) simulation. Furthermore, we prove that the proposed EHR system provides secure mutual authentication using BAN logic analysis. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
57por Oh, JiHyeon, Yu, SungJin, Lee, JoonYoung, Son, SeungHwan, Kim, MyeongHyun, Park, YoungHo“…We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
58por Shariq, Mohd, Singh, Karan, Bajuri, Mohd Yazid, Pantelous, Athanasios A., Ahmadian, Ali, Salimi, Mehdi“…Compared with the similar existing protocols, the security analysis followed by the performance evaluation of our proposed protocol demonstrates the minimal computation overheads and also provides resistance to various well-known security attacks. The AVISPA and Scyther simulation results confirm that the proposed protocol is safe under active and passive attacks. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
59“…Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows–Abadi–Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
60“…The automated verification of internet security protocols and applications (AVISPA) simulation is used to simulate the system security of the proposed protocol and to provide formal verification. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto