Sciweavers

1853 search results - page 271 / 371
» Cryptographic Protocols and Network Security
Sort
View
PADL
2001
Springer
15 years 8 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
MAM
2007
143views more  MAM 2007»
15 years 3 months ago
A distributed admission control system for MANET environments supporting multipath routing protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, José Oliver...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 11 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
ICDCS
2002
IEEE
15 years 9 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 10 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...