Sciweavers

741 search results - page 46 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
179
Voted
CAMAD
2006
IEEE
15 years 6 months ago
Nessi: a python network simulator for fast protocol development
A new and simple network simulator Nessi is described in this paper. While other simulators focus on minimizing the simulation time, Nessi tries to minimize the development time an...
Jérôme Vernez, Jürgen Ehrensberg...
SIGCOMM
1997
ACM
15 years 8 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
CCS
2007
ACM
15 years 10 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
SPW
2005
Springer
15 years 9 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
CRYPTO
2007
Springer
109views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quant...
Ivan Damgård, Serge Fehr, Renato Renner, Lou...