Sciweavers

5488 search results - page 46 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
107
Voted
CCS
2009
ACM
15 years 7 months ago
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering
Juan Caballero, Pongsin Poosankam, Christian Kreib...
100
Voted
CSFW
2004
IEEE
15 years 7 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
IPSN
2007
Springer
15 years 9 months ago
MiniSec: a secure sensor network communication architecture
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protoco...
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. ...
127
Voted
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 3 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
101
Voted
NDSS
1998
IEEE
15 years 7 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just