Sciweavers

5488 search results - page 66 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
SUTC
2006
IEEE
15 years 5 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
ICCCN
2008
IEEE
15 years 6 months ago
Security Extensions for Space-Link Communication
—In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a ...
Daniel Fischer, Mario Merri, Thomas Engel
ACSAC
2005
IEEE
15 years 5 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...
CSFW
1997
IEEE
15 years 4 months ago
Strategies against Replay Attacks
Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
Tuomas Aura