• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 39,815
Next 10 →

Analyzing Internet security protocols

by Alec Yasinsac, Justin Childs - Proceedings of the Sixth IEEE International Symposium on High Assurance Systems Engineering , 2001
"... In this paper, we show how a novel tool for analyzing classical cryptographic protocols can be used to model and analyze the more complex Internet security protocol families. We discuss the modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Securi ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
In this paper, we show how a novel tool for analyzing classical cryptographic protocols can be used to model and analyze the more complex Internet security protocol families. We discuss the modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer

2006. Bootstrapping the adoption of internet security protocols

by Andy Ozment, Stuart E. Schechter - In Workshop on the Economics of Information Security (WEIS). URL http://www.cl.cam.ac.uk/ ~jo262/papers/Ozment_Schechter-Bootstrapping_the_Adoption_ of_Internet_Security_Protocols.pdf
"... The deployment of network-wide security enhancements to the Internet has proven more difficult than many had initially anticipated. We leverage existing models of networks ’ value to model the problem of bootstrapping the adoption of security technologies. We describe a variety of policy interventio ..."
Abstract - Cited by 30 (2 self) - Add to MetaCart
interventions and deployment strategies that can help to catalyze this adoption. Using this framework, we provide a series of short case studies for previous attempts to deploy security technologies to the Internet. We then provide a detailed study of strategies for deploying security-enhanced protocols

Dartmouth College. Bootstrapping the Adoption of Internet Security Protocols

by Andy Ozment, Stuart E. Schechter, Andy Ozment, Stuart E. Schechter , 2006
"... The deployment of network-wide security enhancements to the Internet has proven more difficult than many had initially anticipated. We leverage existing models of networks ’ value to model the problem of bootstrapping the adoption of security technologies. We describe a variety of policy interventio ..."
Abstract - Add to MetaCart
interventions and deployment strategies that can help to catalyze this adoption. Using this framework, we provide a series of short case studies for previous attempts to deploy security technologies to the Internet. We then provide a detailed study of strategies for deploying the security-enhanced protocols

Security Architecture for the Internet Protocol

by Randall Atkinson - RFC 1825 , 1995
"... Content-Type: text/plain ..."
Abstract - Cited by 1755 (15 self) - Add to MetaCart
Content-Type: text/plain

Internet Protocol

by J. Reynolds, J. Postel - DARPA Internet Program Protocol Specification", STD 5, RFC 791, USC/Information Sciences Institute , 1981
"... This memo is an official status report on the protocols used in the Internet community. Distribution of this memo is unlimited. ..."
Abstract - Cited by 735 (14 self) - Add to MetaCart
This memo is an official status report on the protocols used in the Internet community. Distribution of this memo is unlimited.

On the Security of Public Key Protocols

by Danny Dolev, Andrew C. Yao , 1983
"... Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an impr ..."
Abstract - Cited by 1383 (0 self) - Add to MetaCart
, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine

Multiparty unconditionally secure protocols

by David Chaum, Ivan Damgdr - In STOC ’88: Proceedings of the twentieth annual ACM symposium on Theory of computing , 1988
"... Under the assumption that each pair of participants em communieatc secretly, we show that any reasonable multiparty protwol can be achieved if at least Q of the Participants am honest. The secrecy achieved is unconditional, It does not rely on any assumption about computational intractability. 1. ..."
Abstract - Cited by 556 (12 self) - Add to MetaCart
Under the assumption that each pair of participants em communieatc secretly, we show that any reasonable multiparty protwol can be achieved if at least Q of the Participants am honest. The secrecy achieved is unconditional, It does not rely on any assumption about computational intractability. 1.

The Deisgn Philosophy of the DARPA Internet Protocols

by David D. Clark - In ACM SIGCOMM , 1988
"... The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work, it i ..."
Abstract - Cited by 551 (2 self) - Add to MetaCart
The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work

SPINS: Security Protocols for Sensor Networks

by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar , 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract - Cited by 1094 (30 self) - Add to MetaCart
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized

Internet time synchronization: The network time protocol

by D. L. Mills , 1989
"... This memo describes the Network Time Protocol (NTP) designed to distribute time information in a large, diverse internet system operating at speeds from mundane to lightwave. It uses a returnabletime architecture in which a distributed subnet of time servers operating in a self-organizing, hierarchi ..."
Abstract - Cited by 628 (15 self) - Add to MetaCart
This memo describes the Network Time Protocol (NTP) designed to distribute time information in a large, diverse internet system operating at speeds from mundane to lightwave. It uses a returnabletime architecture in which a distributed subnet of time servers operating in a self
Next 10 →
Results 1 - 10 of 39,815
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University