Sciweavers

1777 search results - page 78 / 356
» Programming Cryptographic Protocols
Sort
View
ISCC
2007
IEEE
14 years 3 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
ISPEC
2007
Springer
14 years 2 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ISCN
2006
IEEE
14 years 2 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 2 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 3 months ago
IPSec: Performance Analysis and Enhancements
Abstract— Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). In previous work, we examined the overheads incurred...
Craig A. Shue, Minaxi Gupta, Steven A. Myers