Sciweavers

3751 search results - page 38 / 751
» Events in security protocols
Sort
View
VIZSEC
2007
Springer
14 years 1 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
ISPEC
2009
Springer
14 years 2 months ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...
CSFW
2004
IEEE
13 years 11 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
CCS
2006
ACM
13 years 11 months ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...
CCS
2010
ACM
13 years 8 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...