Sciweavers

5324 search results - page 74 / 1065
» Internet Security Protocols
Sort
View
CSFW
1999
IEEE
14 years 1 days ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
JTAER
2006
78views more  JTAER 2006»
13 years 7 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
HPN
1998
13 years 9 months ago
A Dynamic Sender-Initiated Reservation Protocol for the Internet
In this paper we discuss the need for resource reservation in the Internet and examine some of the strengths and weaknesses of RSVP, which is currently the most popular of Interne...
Paul Patrick White, Jon Crowcroft
JHSN
1998
66views more  JHSN 1998»
13 years 7 months ago
A case for dynamic sender-based reservations in the Internet
In this paper we discuss the need for resource reservation in the Internet and examine some of the strengths and weaknesses of RSVP, which is currently the most popular of Interne...
Paul Patrick White, Jon Crowcroft
IASTEDSEA
2004
13 years 9 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao