Sciweavers

2846 search results - page 112 / 570
» Not one click for security
Sort
View
NDSS
2000
IEEE
15 years 9 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 6 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
SEC
2007
15 years 5 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 5 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 4 months ago
Generalized Secure Distributed Source Coding with Side Information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...