Sciweavers

1040 search results - page 95 / 208
» Privacy for Telecom Services
Sort
View
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 1 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
ACSAC
2009
IEEE
14 years 1 months ago
RAD: Reflector Attack Defense Using Message Authentication Codes
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...
ACSAC
2001
IEEE
14 years 24 days ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
CSFW
1995
IEEE
14 years 21 days ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
CRITIS
2007
13 years 10 months ago
The Structure of the Sense of Security, Anshin
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, ...