Sciweavers

104 search results - page 7 / 21
» Security Analysis and Improvements for IEEE 802.11i
Sort
View
IRI
2006
IEEE
15 years 3 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
CSFW
2000
IEEE
15 years 1 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
INFOCOM
2008
IEEE
15 years 3 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
DCC
2008
IEEE
15 years 9 months ago
Improved versions of Tardos' fingerprinting scheme
We study the Tardos' probabilistic fingerprinting scheme and show that its codeword length may be shortened by a factor of approximately 4. We achieve this by retracing Tardo...
Oded Blayer, Tamir Tassa
ICST
2009
IEEE
14 years 7 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...