Sciweavers

1612 search results - page 83 / 323
» About models of security protocols
Sort
View
121
Voted
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
114
Voted
FSTTCS
2009
Springer
15 years 10 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
156
Voted
KBSE
2007
IEEE
15 years 10 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
140
Voted
ECSA
2010
Springer
15 years 4 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
111
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi