Sciweavers

5324 search results - page 70 / 1065
» Internet Security Protocols
Sort
View
103
Voted
CSFW
2004
IEEE
15 years 7 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
GCC
2003
Springer
15 years 9 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ESORICS
2008
Springer
15 years 5 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
JNSM
2010
110views more  JNSM 2010»
14 years 10 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
101
Voted
WWW
2008
ACM
16 years 4 months ago
Protecting the web: phishing, malware, and other security threats
Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Ed...