Sciweavers

319 search results - page 55 / 64
» Identification Protocols Secure against Reset Attacks
Sort
View
116
Voted
TOPLAS
2008
101views more  TOPLAS 2008»
15 years 10 days ago
Verifying policy-based web services security
WS-SecurityPolicy is a declarative language for configuring web services security mechanisms. We describe a formal semantics for WS-SecurityPolicy and propose a more abstract lang...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
ACIIDS
2009
IEEE
215views Database» more  ACIIDS 2009»
15 years 2 months ago
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
112
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
ASIACRYPT
2011
Springer
14 years 13 days ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
102
Voted
COMPSEC
2008
99views more  COMPSEC 2008»
15 years 16 days ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin