Sciweavers

179 search results - page 28 / 36
» Analysis of EAP-GPSK Authentication Protocol
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 24 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
IACR
2011
113views more  IACR 2011»
12 years 7 months ago
GNUC: A New Universal Composability Framework
We put forward a framework for the modular design and analysis of multi-party protocols. Our framework is called “GNUC” (with the recursive meaning “GNUC’s Not UC”), alr...
Dennis Hofheinz, Victor Shoup
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
TITB
2010
181views Education» more  TITB 2010»
13 years 2 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...