Sciweavers

3504 search results - page 50 / 701
» Secure protocol composition
Sort
View
SIGCOMM
2004
ACM
15 years 3 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
FORTE
2007
14 years 11 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
ASWEC
2007
IEEE
15 years 4 months ago
Dynamic Protocol Aggregation and Adaptation for Service-Oriented Computing
Service Oriented Computing (SOC) is a paradigm for building new software applications from existing loosely-coupled services. During service composition, services available to pla...
Linh Duy Pham, Alan W. Colman, Jean-Guy Schneider
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
CSFW
1997
IEEE
15 years 1 months ago
Strategies against Replay Attacks
Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
Tuomas Aura