Sciweavers

62 search results - page 3 / 13
» Toward a Taxonomy and Costing Method for Security Services
Sort
View
NDSS
2000
IEEE
13 years 10 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 28 days ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
PIMRC
2010
IEEE
13 years 4 months ago
Communication cost analysis of MBSFN in LTE
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
ICSM
2002
IEEE
13 years 11 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
GI
2009
Springer
13 years 4 months ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier