Sciweavers

4305 search results - page 265 / 861
» Analysing Protocol Implementations
Sort
View
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 4 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
AUTOMATICA
2004
104views more  AUTOMATICA 2004»
15 years 2 months ago
Input-to-state stability of networked control systems
A new class of Lyapunov uniformly globally asymptotically stable (UGAS) protocols in networked control systems (NCS) is considered. It is shown that if the controller is designed ...
Dragan Nesic, Andrew R. Teel
124
Voted
TISSEC
2002
82views more  TISSEC 2002»
15 years 2 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
15 years 28 days ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
WISTP
2010
Springer
15 years 9 days ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel