Sciweavers

44 search results - page 7 / 9
» Towards Validating Security Protocol Deployment in the Wild
Sort
View
IM
2003
13 years 6 months ago
Towards XML Oriented Internet Management
: Internet Management is based on IETF specifications that have been developed and used during the past 14 years: There are multiple versions and options of the management protoco...
Frank Strauß, Torsten Klie
CN
2007
99views more  CN 2007»
13 years 5 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
IPPS
2005
IEEE
13 years 11 months ago
MOCCA - Towards a Distributed CCA Framework for Metacomputing
— We describe the design and implementation of MOCCA, a distributed CCA framework implemented using the H2O metacomputing system. Motivated by the quest for appropriate metasyste...
Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sundera...
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 9 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
ASIACRYPT
2009
Springer
13 years 12 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...