Sciweavers

461 search results - page 51 / 93
» Developing security protocols by refinement
Sort
View
SIGCOMM
1994
ACM
15 years 1 months ago
Improved Algorithms for Synchronizing Computer Network Clocks
The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satel...
David L. Mills
EUROSEC
2009
ACM
15 years 4 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
POLICY
2001
Springer
15 years 2 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ICDCSW
2011
IEEE
13 years 9 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
CCS
2006
ACM
15 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang