Sciweavers

849 search results - page 28 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
125
Voted
ICIW
2007
IEEE
15 years 18 days ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
83
Voted
IPCCC
2006
IEEE
15 years 6 months ago
Unstructured peer-to-peer session over IP using SIP
— Data and telephone service providers have started considering migration to an IP based environment. This paper presents an unstructured peer-to-peer approach to initiating and ...
Khashayar Khavari, Chuen Liang, Ali Tizghadam, Far...
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 13 days ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
99
Voted
SOUPS
2009
ACM
15 years 7 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
87
Voted
CSFW
2007
IEEE
15 years 6 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle