Sciweavers

1825 search results - page 97 / 365
» Cryptographic Securities Exchanges
Sort
View
140
Voted
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 3 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
102
Voted
ECIS
2001
15 years 5 months ago
Web Security: The Emperor's New Armour
The World Wide Web originally provided no security services because it was not designed to support sensitive applications. As the Web evolved to become a platform for all types of...
Audun Jøsang, Peter M. Møllerud, Edd...
112
Voted
CN
2000
72views more  CN 2000»
15 years 3 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
102
Voted
BPM
2003
Springer
75views Business» more  BPM 2003»
15 years 9 months ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
109
Voted
GI
2007
Springer
15 years 7 months ago
Agent-Based Container Security Systems: An Interdisciplinary Perspective
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...
Sven Werner, Arne Schuldt, Kateryna Daschkovska