Sciweavers

3751 search results - page 152 / 751
» Events in security protocols
Sort
View
JCP
2006
98views more  JCP 2006»
14 years 10 months ago
Testing Event-Driven Business Processes
Today's business climate requires to constantly evolve IT strategies for responding to new opportunities or threats. While the fundamentals of IT -- reliability, availability,...
Josef Schiefer, Gerd Saurer, Alexander Schatten
MOBISEC
2009
Springer
15 years 4 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 3 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
ICISS
2007
Springer
15 years 4 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
IJAMC
2010
102views more  IJAMC 2010»
14 years 8 months ago
QuON: a quad-tree-based overlay protocol for distributed virtual worlds
—Massively Multiplayer Online Games and Virtual Worlds are among the most popular applications on the Internet. As player numbers increase, the limits of the currently dominant c...
Helge Backhaus, Stephan Krause