Sciweavers

5324 search results - page 198 / 1065
» Internet Security Protocols
Sort
View
CSFW
2005
IEEE
15 years 10 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
CCS
2005
ACM
15 years 10 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
SIGCOMM
2006
ACM
15 years 10 months ago
MIRO: multi-path interdomain routing
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...
Wen Xu, Jennifer Rexford
ICOIN
2001
Springer
15 years 9 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
CAV
2009
Springer
106views Hardware» more  CAV 2009»
16 years 5 months ago
Models and Proofs of Protocol Security: A Progress Report
Bruno Blanchet, Hubert Comon-Lundh, Martín ...