Sciweavers

461 search results - page 69 / 93
» Developing security protocols by refinement
Sort
View
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 8 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
NETWORK
2008
151views more  NETWORK 2008»
13 years 7 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
14 years 9 days ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
ITIIS
2010
128views more  ITIIS 2010»
13 years 6 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
MAAMAW
1994
Springer
13 years 12 months ago
Towards a Theory of Cooperative Problem Solving
One objective of distributed artificial intelligence research is to build systems that are capable of cooperative problem solving. To this end, a number of implementation-oriented ...
Michael Wooldridge, Nicholas R. Jennings