Sciweavers

44 search results - page 2 / 9
» Towards Validating Security Protocol Deployment in the Wild
Sort
View
ESSOS
2010
Springer
14 years 4 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 7 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
WINET
2002
101views more  WINET 2002»
13 years 7 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
IEEEARES
2009
IEEE
14 years 2 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
CCS
2006
ACM
13 years 11 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...