منابع مشابه
Formal Verification of the Secure Sockets Layer Protocol
Secure Sockets Layer (SSL) has become one of the most popular security protocols in the Internet. In this paper we present a formal verification of this protocol using the Casper/FDR2 toolbox. In the analysis of SSL v3.0 Handshake we have used a methodology that considers incremental versions of the protocol. We have started with the most basic protocol, and then we have included other features...
متن کاملSecuring UDT Protocol using Secure Socket Layer
UDT has emerged as a next generation protocol that effectively utilizes the bandwidth in Long Fat Networks (LFN). Lack of security features in UDT protocol is a major concern which has drawn scientist to explore various security mechanisms. As transport layer security mechanisms are mostly widely accepted mechanism to provide security to data in terms of confidentiality, integrity and Authentic...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملProtocol Independence Using the Sockets API
The BSD sockets API provides abstractions and other features that help applications be protocol-independent. Unfortunately, not all of the API is abstract and generic, and many programs do not use the APIs in a protocol-independent way. This means that most network programs, in practice, only work with one layered set of communications protocols { usually TCP over IP. This hinders compatibility...
متن کاملImplementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol
This paper describes our experiences building a secure rlogin environment. With minimal changes to the rlogin server and the use of a secure network layer protocol, we remove the vulnerability of hostname-based authentication and IP source address spoofing. We investigate how applications such as rlogin interact with this new layer, and propose extensions to the rlogin server that can utilize t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science and Cybernetics
سال: 2012
ISSN: 1813-9663,1813-9663
DOI: 10.15625/1813-9663/19/2/1509