Literatura académica sobre el tema "Security protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security protocol"
Younes, Osama y Umar Albalawi. "Securing Session Initiation Protocol". Sensors 22, n.º 23 (23 de noviembre de 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Texto completoRekha, H. y M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n.º 1 (1 de enero de 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Texto completoGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols". it - Information Technology 62, n.º 5-6 (16 de diciembre de 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Texto completoHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang y Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology". IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Texto completoNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik y Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Texto completoAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri y Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Texto completoKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You y Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone". Sensors 21, n.º 6 (15 de marzo de 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Texto completoWang, Ying Lian y Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key". Advanced Materials Research 951 (mayo de 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Texto completoDu, Jinze, Chengtai Gao y Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n.º 1 (31 de diciembre de 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Texto completoBala, Suman, Gaurav Sharma, Hmani Bansal y Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols". Scalable Computing: Practice and Experience 20, n.º 1 (9 de marzo de 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Texto completoTesis sobre el tema "Security protocol"
O'Shea, Nicholas. "Verification and validation of security protocol implementations". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Texto completoDowling, Benjamin James. "Provable security of internet protocols". Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Texto completoChoi, H. J. "Security protocol design by composition". Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Texto completoGibson-Robinson, Thomas. "Analysing layered security protocols". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Texto completoModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx". Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Texto completoAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Dobson, Lucas E. "Security analysis of session initiation protocol". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Texto completoThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian y Manjinder Singh. "Web API protocol and security analysis". Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Texto completoDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jones, Benjamin Edward. "Improving security in the FDDI protocol". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Texto completoHsu, Yating. "Formal Analysis of Network Protocol Security". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Texto completoHanna, Youssef. "Verifying sensor network security protocol implementations". [Ames, Iowa : Iowa State University], 2008.
Buscar texto completoLibros sobre el tema "Security protocol"
Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Buscar texto completoJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Buscar texto completoEric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Buscar texto completoUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Buscar texto completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Buscar texto completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Buscar texto completo1969-, Rudnick Lisa B. y United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Buscar texto completoHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Buscar texto completoKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Buscar texto completoArmando, Alessandro y Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Texto completoCapítulos de libros sobre el tema "Security protocol"
Saïdi, Hassen, Victoria Stavridou y Bruno Duterte. "Protocol Codesign". En Security Protocols, 106–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.
Texto completoStavridou, Victoria. "Protocol Codesign". En Security Protocols, 114–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.
Texto completoKelsey, John, Bruce Schneier y David Wagner. "Protocol interactions and the chosen protocol attack". En Security Protocols, 91–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.
Texto completoSchoenmakers, Berry. "Protocol". En Encyclopedia of Cryptography and Security, 990. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.
Texto completoHess, Andreas V., Sebastian A. Mödersheim y Achim D. Brucker. "Stateful Protocol Composition". En Computer Security, 427–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.
Texto completoPaulson, Lawrence C. "The Yahalom Protocol". En Security Protocols, 78–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.
Texto completoKøien, Geir M. "Security Protocol Verification". En Entity Authentication and Personal Privacy in Future Cellular Systems, 209–19. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.
Texto completoWeik, Martin H. "protocol security option". En Computer Science and Communications Dictionary, 1362. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.
Texto completoMa, Jianfeng, Changguang Wang y Zhuo Ma. "Security Access Protocol". En Security Access in Wireless Local Area Networks, 87–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.
Texto completoMyrvang, Per Harald y Tage Stabell-Kulø. "Cordial Security Protocol Programming". En Security Protocols, 62–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_11.
Texto completoActas de conferencias sobre el tema "Security protocol"
Tan, Yang y Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". En 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Texto completoPinto, Lucas W. P. y Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol". En IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.
Texto completoWang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang y Qixu Liu. "Medical Protocol Security". En CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.
Texto completoBassil, Carole, Ahmed Serhrouchni y Nicolas Rouhana. "Simple voice security protocol". En Proceeding of the 2006 international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.
Texto completoMcDermott, J. "Visual security protocol modeling". En the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.
Texto completoCha, Eun-Chul, Hyoung-Kee Choi y Sung-Jae Cho. "Evaluation of Security Protocols for the Session Initiation Protocol". En 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317885.
Texto completoMartin, Cynthia E. y Jeffrey H. Dunn. "Internet Protocol Version 6 (IPv6) Protocol Security Assessment". En MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455200.
Texto completoQing-gui, Hu. "The new IPv6 security protocol-limited transmission protocol". En 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.
Texto completoZisiadis, Dimitris, Spyros Kopsidas y Leandros Tassiulas. "Voice Interactive Personalized Security Protocol: Definition and Security Analysis". En 2007 3rd IEEE Workshop on Secure Network Protocols. IEEE, 2007. http://dx.doi.org/10.1109/npsec.2007.4371621.
Texto completoDunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains". En 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.
Texto completoInformes sobre el tema "Security protocol"
Symington, S., S. Farrell, H. Weiss y P. Lovell. Bundle Security Protocol Specification. RFC Editor, mayo de 2011. http://dx.doi.org/10.17487/rfc6257.
Texto completoMcDermott, J. Visual Security Protocol Modeling. Fort Belvoir, VA: Defense Technical Information Center, enero de 2005. http://dx.doi.org/10.21236/ada464079.
Texto completoKuhn, D. R., K. Sriram y D. C. Montgomery. Border gateway protocol security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.
Texto completoBirrane, E. y K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, febrero de 2022. http://dx.doi.org/10.17487/rfc9172.
Texto completoBirrane, E., A. White y S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, febrero de 2022. http://dx.doi.org/10.17487/rfc9173.
Texto completoFarrell, S., M. Ramadas y S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, septiembre de 2008. http://dx.doi.org/10.17487/rfc5327.
Texto completoAtkinson, Randall J. Security for the Internet Protocol. Fort Belvoir, VA: Defense Technical Information Center, noviembre de 1995. http://dx.doi.org/10.21236/ada301902.
Texto completoAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, agosto de 1995. http://dx.doi.org/10.17487/rfc1825.
Texto completoKent, S. y R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, noviembre de 1998. http://dx.doi.org/10.17487/rfc2401.
Texto completoHollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, mayo de 2004. http://dx.doi.org/10.17487/rfc3749.
Texto completo