Sciweavers

5324 search results - page 105 / 1065
» Internet Security Protocols
Sort
View
COMPUTER
1998
40views more  COMPUTER 1998»
14 years 9 months ago
Security at the Internet Layer
Rolf Oppliger
ACISP
2008
Springer
14 years 11 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 10 days ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
15 years 2 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette