Sciweavers

CSFW
2006
IEEE
15 years 27 days ago
Verified Interoperable Implementations of Security Protocols
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CSFW
2006
IEEE
15 years 27 days ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CCS
2006
ACM
15 years 27 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
50
Voted
CRITIS
2006
15 years 28 days ago
A Framework for Conceptualizing Social Engineering Attacks
Jose J. Gonzalez, Jose Maria Sarriegi, Alazne Gurr...
50
Voted
CRITIS
2006
15 years 28 days ago
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
Christos Xenakis, Lazaros F. Merakos
51
Voted
CRITIS
2006
15 years 28 days ago
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
64
Voted
CRITIS
2006
15 years 28 days ago
A Framework for Secure and Verifiable Logging in Public Communication Networks
Vassilios Stathopoulos, Panayiotis Kotzanikolaou, ...
54
Voted
CRITIS
2006
15 years 28 days ago
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
Daniel J. Martínez-Manzano, Gabriel L&oacut...
50
Voted
CRITIS
2006
15 years 28 days ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen