Learn More
In this paper we evaluate a cost function of a secure key distribution centre. A queueing network model has been established for this protocol. Due to the complex calculation of original equations with large scale system, more efficient asymptotic bounds approach have been introduced to implement a hybrid solution which has the advantage of efficiency and(More)
In this paper, we described a experience of using PEPA eclipse plug-in tool to specify a functional-equivalent representation of a non-repudiation protocol. The model is specified using Markovian process algebra PEPA. The basic model suffers from the well known state space explosion problem when tackled using Continues Time Markov Chain analysis. In order(More)
In this paper an authentication protocol, Kerberos, is investigated. To consider the scenario where there are multiple realms, a simplification is applied. The simplified model is equivalent to original model in terms of the steady state distribution. It is analysed numerically using a fluid flow approximation and is verified by stochastic simulation.
In this paper we study the overhead introduced by secure functions in considering two models of non-repudiation protocols. The models are specified using the Markovian process algebra PEPA. The basic model suffers from the well known state space explosion problem when tackled using Markov chain analysis. Following previous study of performance modelling on(More)
In this paper we study the overhead introduced by secure functions in considering two models of non-repudiation protocols. The models are specified using the Markovian process algebra PEPA. The basic model suffers from the well known state space explosion problem when tackled using Markov chain analysis. Following previous study of performance modelling on(More)
In this paper we explore the trade-of between security and performance in considering a model of a key distribution centre. The model is specified using the Markovian process algebra PEPA and analysed numerically. Three versions of the model are proposed, using different modelling approaches and assumptions about the behaviour of the system. These different(More)