Sciweavers

3751 search results - page 8 / 751
» Events in security protocols
Sort
View
141
Voted
TPHOL
2003
IEEE
15 years 8 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
146
Voted
JNW
2008
83views more  JNW 2008»
15 years 3 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
100
Voted
NORDSEC
2009
Springer
15 years 10 months ago
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic
Ejaz Ahmed, Andrew Clark, George M. Mohay
106
Voted
OOPSLA
2001
Springer
15 years 8 months ago
On Objects and Events
Patrick Th. Eugster, Rachid Guerraoui, Christian H...
158
Voted
IWSEC
2010
Springer
15 years 1 months ago
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party prot...
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamo...