Sciweavers

3972 search results - page 22 / 795
» Design of the iSCSI Protocol
Sort
View
CADE
2011
Springer
13 years 11 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
PERCOM
2010
ACM
14 years 10 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
IACR
2011
182views more  IACR 2011»
13 years 11 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
HPCC
2010
Springer
14 years 9 months ago
Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in ...
Roland Bless, Martin Röhricht
IACR
2011
105views more  IACR 2011»
13 years 11 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi