Academic literature on the topic 'Security protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security protocol"
Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (November 23, 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Full textHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Full textAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Full textKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (March 15, 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Full textWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Full textDu, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (December 31, 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Full textBala, Suman, Gaurav Sharma, Hmani Bansal, and Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Full textDissertations / Theses on the topic "Security protocol"
O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textChoi, H. J. "Security protocol design by composition." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Full textAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textHanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.
Find full textBooks on the topic "Security protocol"
Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Find full textJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Find full textEric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Find full textUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full textMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Find full text1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Find full textHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Find full textKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Find full textArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Full textBook chapters on the topic "Security protocol"
Saïdi, Hassen, Victoria Stavridou, and Bruno Duterte. "Protocol Codesign." In Security Protocols, 106–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.
Full textStavridou, Victoria. "Protocol Codesign." In Security Protocols, 114–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.
Full textKelsey, John, Bruce Schneier, and David Wagner. "Protocol interactions and the chosen protocol attack." In Security Protocols, 91–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.
Full textSchoenmakers, Berry. "Protocol." In Encyclopedia of Cryptography and Security, 990. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.
Full textHess, Andreas V., Sebastian A. Mödersheim, and Achim D. Brucker. "Stateful Protocol Composition." In Computer Security, 427–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.
Full textPaulson, Lawrence C. "The Yahalom Protocol." In Security Protocols, 78–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.
Full textKøien, Geir M. "Security Protocol Verification." In Entity Authentication and Personal Privacy in Future Cellular Systems, 209–19. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.
Full textWeik, Martin H. "protocol security option." In Computer Science and Communications Dictionary, 1362. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.
Full textMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Access Protocol." In Security Access in Wireless Local Area Networks, 87–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.
Full textMyrvang, Per Harald, and Tage Stabell-Kulø. "Cordial Security Protocol Programming." In Security Protocols, 62–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_11.
Full textConference papers on the topic "Security protocol"
Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textPinto, Lucas W. P., and Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol." In IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.
Full textWang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, and Qixu Liu. "Medical Protocol Security." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.
Full textBassil, Carole, Ahmed Serhrouchni, and Nicolas Rouhana. "Simple voice security protocol." In Proceeding of the 2006 international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.
Full textMcDermott, J. "Visual security protocol modeling." In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.
Full textCha, Eun-Chul, Hyoung-Kee Choi, and Sung-Jae Cho. "Evaluation of Security Protocols for the Session Initiation Protocol." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317885.
Full textMartin, Cynthia E., and Jeffrey H. Dunn. "Internet Protocol Version 6 (IPv6) Protocol Security Assessment." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455200.
Full textQing-gui, Hu. "The new IPv6 security protocol-limited transmission protocol." In 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.
Full textZisiadis, Dimitris, Spyros Kopsidas, and Leandros Tassiulas. "Voice Interactive Personalized Security Protocol: Definition and Security Analysis." In 2007 3rd IEEE Workshop on Secure Network Protocols. IEEE, 2007. http://dx.doi.org/10.1109/npsec.2007.4371621.
Full textDunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.
Full textReports on the topic "Security protocol"
Symington, S., S. Farrell, H. Weiss, and P. Lovell. Bundle Security Protocol Specification. RFC Editor, May 2011. http://dx.doi.org/10.17487/rfc6257.
Full textMcDermott, J. Visual Security Protocol Modeling. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada464079.
Full textKuhn, D. R., K. Sriram, and D. C. Montgomery. Border gateway protocol security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.
Full textBirrane, E., and K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9172.
Full textBirrane, E., A. White, and S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9173.
Full textFarrell, S., M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, September 2008. http://dx.doi.org/10.17487/rfc5327.
Full textAtkinson, Randall J. Security for the Internet Protocol. Fort Belvoir, VA: Defense Technical Information Center, November 1995. http://dx.doi.org/10.21236/ada301902.
Full textAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1825.
Full textKent, S., and R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, November 1998. http://dx.doi.org/10.17487/rfc2401.
Full textHollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3749.
Full text