نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

2008
Guoqiang Li

Due to extreme importance of security protocols in the modern world, to ensure security protocols to be more reliable, and to speed up the development of new protocols, it is important to have tools that support the activity of finding flaws in protocols, or guaranteeing correctness of protocols. Various formalisms for the specification of security protocols have been proposed based on, e.g. pr...

Journal: :MONET 2007
Avesh Kumar Agarwal Wenye Wang

Wireless local area networks (LANs) are vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications even at the cost of quality of service (QoS). However, there is very little work on investigating to what extent system performance is affected by security configurations with respect to mobility scena...

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

2007
Ralf Küsters Tomasz Truderung

In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently, first results on the decidability of the security of such protocols have been obtained. While recursive protocols often employ operators with algebraic, security relevant properties, such as the exclusive OR (XOR), the existin...

2005
Nikos Mavrogiannopoulos

In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of application profiles are left out of the scope of this document. We give a summary of the networking protocols of Bl...

Journal: :I. J. Network Security 2013
H. K. Pathak Manju Sanghi

In 2005, Abdalla and Pointcheval suggested a new variation of the computational DH assumption called chosen based computational Diffie Hellman (CCDH) and presented SPAKE-1 and SPAKE-2 simple password based authenticated key exchange protocols. Since then several three party password authenticated key agreement protocols have been proposed based on CCDH assumption but most of them broken. In thi...

1997
J. P. Bekmann P. de Goede

Multi-dimensional security analysis is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, is a protocol engineering tool which focuses on security protocols, with the specific aim of producing secure and effi...

Journal: :Journal of Research and Practice in Information Technology 2005
Siraj Ahmed Shaikh Vicky J. Bush

Designing security protocols is a challenging and deceptive exercise. Even small protocols providing straightforward security goals, such as authentication, have been hard to design correctly, leading to the presence of many subtle attacks. Over the years various formal approaches have emerged to analyse security protocols making use of different formalisms. Schneider has developed a formal app...

Journal: :IACR Cryptology ePrint Archive 2000
Ran Canetti

We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved under a general protocol composition operation, called universal composition. The proposed frame...

2003
Xiangming Fang Shoubao Yang Leitao Guo Lei Zhang

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid Security Basic Layer, several protocols are defined at Grid Security Protocol Layer based on security architecture model. Broker protocols are then thoroughly discussed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید