Sciweavers

849 search results - page 23 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
100
Voted
EUROSEC
2009
ACM
15 years 7 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
106
Voted
WCE
2007
15 years 1 months ago
A Performance Based Evaluation of SIP Signalling across Converged Networks
—As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for be...
Adetola Oredope, Antonio Liotta
98
Voted
ACISP
2010
Springer
15 years 2 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
127
Voted
CSFW
2005
IEEE
15 years 6 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
111
Voted
CSFW
2010
IEEE
15 years 4 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...