Sciweavers

1106 search results - page 25 / 222
» Automated Design of Security Protocols
Sort
View
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
14 years 3 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...
CCR
2007
115views more  CCR 2007»
13 years 10 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 4 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
ASIASIM
2004
Springer
14 years 3 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
COLCOM
2005
IEEE
14 years 3 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta