Sciweavers

849 search results - page 33 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 7 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
INFOCOM
2006
IEEE
14 years 1 months ago
Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol
— The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol component in the IETF Next Steps In Signaling (NSIS) protocol stack t...
Xiaoming Fu, Henning Schulzrinne, Hannes Tschofeni...
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 2 months ago
Providing End-to-End Connectivity to SIP User Agents Behind NATs
— The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits...
Mario Baldi, Luca De Marco, Fulvio Risso, Livio To...
CCS
2006
ACM
13 years 11 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman