Sciweavers

3751 search results - page 68 / 751
» Events in security protocols
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning
IWSEC
2007
Springer
15 years 4 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
FORTE
2008
14 years 11 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
ESORICS
2005
Springer
15 years 3 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ICFEM
2003
Springer
15 years 3 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone