Sciweavers

3088 search results - page 23 / 618
» Multichannel Security Protocols
Sort
View
124
Voted
AINA
2007
IEEE
15 years 9 months ago
Applying Web-based Networking Protocols and Software Architectures for providing adaptivity, personalization, and remotization f
This paper proposes an innovative use of a mix of networking standards and software implementation technologies for the design of industrial Human Machine Interface (HMI) systems....
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...
142
Voted
AISM
2004
15 years 4 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
AINA
2004
IEEE
15 years 6 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
92
Voted
FOSAD
2007
Springer
15 years 8 months ago
Security Protocols: Principles and Calculi
Martín Abadi