نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

Journal: :CoRR 2016
Tobias Fiebig Franziska Lichtblau Florian Streibelt Thorben Krueger Pieter Lexis Randy Bush Anja Feldmann

Today’s Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements...

2000
Alec Yasinsac

Secure electronic communication relies on the application of cryptography. However, even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, privacy, etc. We are beginning to see environments characterized by high volume encrypted traffic between large numbers of communicating principals, facilitated by heterogeneous i...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Yannick Chevalier Laurent Vigneron

We present a low-level specification language used for describing real Internet security protocols. Specifications are automatically generated by a compiler, from TLA-based high-level descriptions of the protocols. The results are rule-based programs containing all the information needed for either implementing the protocols, or verifying some security properties. This approach has already been...

2003
Ibrahim S. Abdullah Daniel A. Menascé

Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a unified architecture for the implementation of security protocols in the form of a security toolbox system. Our design, based on the concepts of Component Based Software Engineering (CBSE), provides fast and flexible im...

Journal: :RFC 2006
Fabio Maino David L. Black

This document describes the use of IKEv2 to negotiate security protocols and transforms for Fibre Channel as part of the Fibre Channel Security Association Management Protocol. This usage requires that IKEv2 be extended with Fibre-Channel-specific security protocols, transforms, and name types. This document specifies these IKEv2 extensions and allocates identifiers for them. Using new IKEv2 id...

2012
Binh Thanh Nguyen David Basin Christoph Sprenger

The rigorous incremental development of security protocols has so far received much less attention than protocol verification techniques. In this work, we study security protocol transformations. These can serve both for simplifying protocols before verification and, in the other direction, for developing protocols by stepwise refinement of simple abstract protocols into complex concrete ones. ...

2001
Dawn Xiaodong Song Adrian Perrig Doantam Phan

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Veri cation, and Implementation of Security Protocols. With AGVI, the protocol designer inpu...

2005
Aslan Askarov Andrei Sabelfeld

Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are ba...

Journal: :IEEE Computer 1998
Rolf Oppliger

43 I nternet Protocol, version 6, was conceived with two main goals: increase address space and improve security, relative to IPv4. 1 The community achieved the first goal by increasing the IP address length from 32 bits to 128 bits. To meet the second goal, the Internet Engineering Task Force chartered the IP Security Working Group to design a security architecture and corresponding protocols ...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Ali Al Shidhani Victor C. M. Leung

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید