Sciweavers

741 search results - page 73 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
CSREASAM
2006
15 years 5 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
15 years 10 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
CCR
2004
74views more  CCR 2004»
15 years 3 months ago
Unveiling the transport
Traditional application programming interfaces for transport protocols make a virtue of hiding most internal per-connection state. We argue that this informationhiding precludes m...
Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Low...
187
Voted
AOSD
2005
ACM
15 years 9 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
CD
2004
Springer
15 years 9 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry