Sciweavers

5488 search results - page 31 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
BCS
2008
13 years 10 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ISCC
2007
IEEE
14 years 3 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
ITRE
2005
IEEE
14 years 2 months ago
Securing RSVP and RSVP-TE signaling protocols and their performance study
RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...
AWIC
2003
Springer
14 years 2 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
GLOBECOM
2008
IEEE
14 years 3 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun