Sciweavers

3115 search results - page 227 / 623
» Synthesizing Secure Protocols
Sort
View
ESCIENCE
2005
IEEE
15 years 11 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
15 years 11 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya
SASN
2005
ACM
15 years 11 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
CSFW
2002
IEEE
15 years 10 months ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather
COMPSEC
2008
111views more  COMPSEC 2008»
15 years 5 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...