Sciweavers

1278 search results - page 158 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
150
Voted
ICCSA
2007
Springer
15 years 9 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
148
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 5 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
119
Voted
NOMS
2008
IEEE
15 years 10 months ago
Towards malware inspired management frameworks
Abstract—Scalability is a real challenge for network management due to the increase of the devices to be managed and their various locations. A potential solution is based on bot...
Jérôme François, Radu State, O...
IEEEARES
2008
IEEE
15 years 10 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
120
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...