Sciweavers

741 search results - page 51 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
ICISS
2007
Springer
15 years 10 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
ECOWS
2006
Springer
15 years 7 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
CAISE
2003
Springer
15 years 9 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...