Sciweavers

573 search results - page 7 / 115
» Security Analysis of Voice-over-IP Protocols
Sort
View
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
CSFW
2000
IEEE
15 years 2 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
CCS
2010
ACM
14 years 10 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
IANDC
2008
120views more  IANDC 2008»
14 years 9 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
CSFW
2012
IEEE
13 years 7 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...