Sciweavers

5324 search results - page 64 / 1065
» Internet Security Protocols
Sort
View
FSTTCS
2007
Springer
14 years 1 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
SIGCOMM
2012
ACM
11 years 10 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 7 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
ESORICS
2002
Springer
14 years 7 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith