Sciweavers

14824 search results - page 131 / 2965
» Security - Introduction
Sort
View
AINA
2004
IEEE
15 years 6 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
CCS
2004
ACM
15 years 6 months ago
Synthesising verified access control systems in XACML
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
93
Voted
CSFW
2004
IEEE
15 years 6 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CCS
2006
ACM
15 years 6 months ago
Measuring intrusion detection capability: an information-theoretic approach
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
CCS
2006
ACM
15 years 6 months ago
Addressing the shortcomings of one-way chains
Roberto Di Pietro, Luigi V. Mancini, Antonio Duran...