Sciweavers

712 search results - page 78 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
POPL
2005
ACM
15 years 10 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
NDSS
1997
IEEE
15 years 2 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
CAISE
2006
Springer
15 years 1 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
WETICE
1998
IEEE
15 years 2 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
BROADNETS
2005
IEEE
15 years 3 months ago
Network design for IP-centric light trail networks
Abstract— We explore network design principles for nextgeneration all-optical wide-area networks, employing light-trail technology. Light-trail [1] is a light-wave circuit that a...
Srivatsan Balasubramanian, Ahmed E. Kamal, Arun K....