Sciweavers

IJNSEC
2008
132views more  IJNSEC 2008»
13 years 11 months ago
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. Th...
Jing Li, Po Zhang, Srinivas Sampalli
IJISEC
2008
69views more  IJISEC 2008»
13 years 11 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 11 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 11 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
COMSIS
2006
100views more  COMSIS 2006»
13 years 11 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
COMPSEC
2006
143views more  COMPSEC 2006»
13 years 11 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
CN
2006
115views more  CN 2006»
13 years 11 months ago
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, whil...
Tamma Bheemarjuna Reddy, S. Sriram, B. S. Manoj, C...
FUIN
2008
82views more  FUIN 2008»
13 years 11 months ago
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in ...
Muhammad Torabi Dashti, Srijith Krishnan Nair, Hug...
ENTCS
2008
83views more  ENTCS 2008»
13 years 11 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 11 months ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...