Sciweavers

718 search results - page 77 / 144
» Operational Semantics of Security Protocols
Sort
View
IMC
2006
ACM
14 years 1 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
MOBIWAC
2009
ACM
14 years 2 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
GC
2004
Springer
13 years 11 months ago
The SOCS Computational Logic Approach to the Specification and Verification of Agent Societies
This article summarises part of the work done during the first two years of the SOCS project, with respect to the task of modelling interaction amongst CL-based agents. It describe...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ICNS
2007
IEEE
14 years 2 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li