Sciweavers

5324 search results - page 144 / 1065
» Internet Security Protocols
Sort
View
AGENTS
2000
Springer
15 years 2 months ago
An Architecture for Modeling Internet-Based Collaborative Agent Systems
Abstract. This paper describes an architecture for modeling cooperating systems of communicating agents. The authors’ goal is not that of providing a framework to implement multi...
Roberto A. Flores, Robert C. Kremer, Douglas H. No...
ADHOCNOW
2009
Springer
14 years 11 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
IEEEARES
2007
IEEE
15 years 4 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto
WONS
2005
IEEE
15 years 3 months ago
Secure Multipath Routing for Mobile Ad Hoc Networks
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...
IADIS
2004
14 years 11 months ago
Enhancing WLAN Security by Introducing EAP-TLS Smartcards
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Mohamad Badra, Pascal Urien