Sciweavers

3751 search results - page 38 / 751
» Events in security protocols
Sort
View
VIZSEC
2007
Springer
15 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
ISPEC
2009
Springer
15 years 4 months ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...
CSFW
2004
IEEE
15 years 1 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
CCS
2006
ACM
15 years 1 months ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...
CCS
2010
ACM
14 years 10 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...