Sciweavers

4305 search results - page 111 / 861
» Analysing Protocol Implementations
Sort
View
ACSAC
2004
IEEE
14 years 22 days ago
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
Steven M. Bellovin
CCS
2007
ACM
14 years 3 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
AP2PC
2003
Springer
14 years 2 months ago
A Robust and Scalable Peer-to-Peer Gossiping Protocol
Abstract. The newscast model is a general approach for communication in large agent-based distributed systems. The two basic services— membership management and information disse...
Spyros Voulgaris, Márk Jelasity, Maarten va...
ISORC
2002
IEEE
14 years 1 months ago
A Time-Triggered Ethernet Protocol for Real-Time CORBA
The Real-Time CORBA and minimumCORBA specifications are important steps towards defining standard-based middleware which can satisfy real-time requirements in an embedded system...
Stefan Lankes, Andreas Jabs, Michael Reke
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 2 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher