Sciweavers

3751 search results - page 20 / 751
» Events in security protocols
Sort
View
135
Voted
AISM
2004
15 years 3 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
119
Voted
AINA
2004
IEEE
15 years 5 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
111
Voted
VIZSEC
2004
Springer
15 years 7 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
87
Voted
FOSAD
2007
Springer
15 years 8 months ago
Security Protocols: Principles and Calculi
Martín Abadi
76
Voted
SPW
2004
Springer
15 years 7 months ago
Toward a Broader View of Security Protocols
Matt Blaze