Sciweavers

5324 search results - page 83 / 1065
» Internet Security Protocols
Sort
View
SPW
1997
Springer
15 years 2 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
ICIW
2008
IEEE
15 years 4 months ago
A Secure Mobile Framework for m-Services
Spyridon Papastergiou, Athanasios Karantjias, Desp...
SAINT
2005
IEEE
15 years 3 months ago
Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks
Nocola Bonelli, Stefano Giordano, Stefano Lucetti,...
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 2 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
IFIP
2009
Springer
14 years 7 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy