Sciweavers

1106 search results - page 28 / 222
» Automated Design of Security Protocols
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
DISCEX
2003
IEEE
14 years 3 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
FC
2010
Springer
181views Cryptology» more  FC 2010»
14 years 1 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
ACSD
2003
IEEE
104views Hardware» more  ACSD 2003»
14 years 1 months ago
A Framework for the Development of Protocols
We present the -Spaces framework, a tool designed to support every step of a security protocol's life cycle. Its Integrated Development Environment (IDE) eases the task of pr...
Federico Crazzolara, Giuseppe Milicia
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
14 years 1 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...