Sciweavers

1161 search results - page 92 / 233
» Group Message Authentication
Sort
View
SAFECOMP
2007
Springer
15 years 7 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
HPCC
2005
Springer
15 years 6 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
94
Voted
USS
2008
15 years 3 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
110
Voted
ADHOC
2007
133views more  ADHOC 2007»
15 years 28 days ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
90
Voted
SAC
2010
ACM
15 years 7 months ago
Fast, flexible, and highly resilient genuine fifo and causal multicast algorithms
We study the fifo and causal multicast problem, two group-communication abstractions that deliver messages in an order consistent with their context. With fifo multicast, the co...
Nicolas Schiper, Fernando Pedone