Letteratura scientifica selezionata sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Security protocol"
Younes, Osama, e Umar Albalawi. "Securing Session Initiation Protocol". Sensors 22, n. 23 (23 novembre 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Testo completoRekha, H., e M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, n. 1 (1 gennaio 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Testo completoGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols". it - Information Technology 62, n. 5-6 (16 dicembre 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Testo completoHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang e Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology". IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Testo completoNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik e Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Testo completoAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri e Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Testo completoKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You e Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone". Sensors 21, n. 6 (15 marzo 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Testo completoWang, Ying Lian, e Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key". Advanced Materials Research 951 (maggio 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Testo completoDu, Jinze, Chengtai Gao e Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n. 1 (31 dicembre 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Testo completoBala, Suman, Gaurav Sharma, Hmani Bansal e Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols". Scalable Computing: Practice and Experience 20, n. 1 (9 marzo 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Testo completoTesi sul tema "Security protocol"
O'Shea, Nicholas. "Verification and validation of security protocol implementations". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Testo completoDowling, Benjamin James. "Provable security of internet protocols". Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Testo completoChoi, H. J. "Security protocol design by composition". Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Testo completoGibson-Robinson, Thomas. "Analysing layered security protocols". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Testo completoModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx". Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Testo completoAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Dobson, Lucas E. "Security analysis of session initiation protocol". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Testo completoThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, e Manjinder Singh. "Web API protocol and security analysis". Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Testo completoDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jones, Benjamin Edward. "Improving security in the FDDI protocol". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Testo completoHsu, Yating. "Formal Analysis of Network Protocol Security". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Testo completoHanna, Youssef. "Verifying sensor network security protocol implementations". [Ames, Iowa : Iowa State University], 2008.
Cerca il testo completoLibri sul tema "Security protocol"
Dorgham, Sisalem, a cura di. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Cerca il testo completoJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Cerca il testo completoEric, Vyncke, a cura di. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Cerca il testo completoUnited Service Institution of India, a cura di. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Cerca il testo completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Cerca il testo completo1969-, Rudnick Lisa B., e United Nations Institute for Disarmament Research, a cura di. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Cerca il testo completoHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Cerca il testo completoKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Cerca il testo completoArmando, Alessandro, e Gavin Lowe, a cura di. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Testo completoCapitoli di libri sul tema "Security protocol"
Saïdi, Hassen, Victoria Stavridou e Bruno Duterte. "Protocol Codesign". In Security Protocols, 106–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.
Testo completoStavridou, Victoria. "Protocol Codesign". In Security Protocols, 114–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.
Testo completoKelsey, John, Bruce Schneier e David Wagner. "Protocol interactions and the chosen protocol attack". In Security Protocols, 91–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.
Testo completoSchoenmakers, Berry. "Protocol". In Encyclopedia of Cryptography and Security, 990. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.
Testo completoHess, Andreas V., Sebastian A. Mödersheim e Achim D. Brucker. "Stateful Protocol Composition". In Computer Security, 427–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.
Testo completoPaulson, Lawrence C. "The Yahalom Protocol". In Security Protocols, 78–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.
Testo completoKøien, Geir M. "Security Protocol Verification". In Entity Authentication and Personal Privacy in Future Cellular Systems, 209–19. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.
Testo completoWeik, Martin H. "protocol security option". In Computer Science and Communications Dictionary, 1362. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.
Testo completoMa, Jianfeng, Changguang Wang e Zhuo Ma. "Security Access Protocol". In Security Access in Wireless Local Area Networks, 87–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.
Testo completoMyrvang, Per Harald, e Tage Stabell-Kulø. "Cordial Security Protocol Programming". In Security Protocols, 62–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_11.
Testo completoAtti di convegni sul tema "Security protocol"
Tan, Yang, e Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Testo completoPinto, Lucas W. P., e Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol". In IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.
Testo completoWang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang e Qixu Liu. "Medical Protocol Security". In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.
Testo completoBassil, Carole, Ahmed Serhrouchni e Nicolas Rouhana. "Simple voice security protocol". In Proceeding of the 2006 international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.
Testo completoMcDermott, J. "Visual security protocol modeling". In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.
Testo completoCha, Eun-Chul, Hyoung-Kee Choi e Sung-Jae Cho. "Evaluation of Security Protocols for the Session Initiation Protocol". In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317885.
Testo completoMartin, Cynthia E., e Jeffrey H. Dunn. "Internet Protocol Version 6 (IPv6) Protocol Security Assessment". In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455200.
Testo completoQing-gui, Hu. "The new IPv6 security protocol-limited transmission protocol". In 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.
Testo completoZisiadis, Dimitris, Spyros Kopsidas e Leandros Tassiulas. "Voice Interactive Personalized Security Protocol: Definition and Security Analysis". In 2007 3rd IEEE Workshop on Secure Network Protocols. IEEE, 2007. http://dx.doi.org/10.1109/npsec.2007.4371621.
Testo completoDunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains". In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.
Testo completoRapporti di organizzazioni sul tema "Security protocol"
Symington, S., S. Farrell, H. Weiss e P. Lovell. Bundle Security Protocol Specification. RFC Editor, maggio 2011. http://dx.doi.org/10.17487/rfc6257.
Testo completoMcDermott, J. Visual Security Protocol Modeling. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2005. http://dx.doi.org/10.21236/ada464079.
Testo completoKuhn, D. R., K. Sriram e D. C. Montgomery. Border gateway protocol security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.
Testo completoBirrane, E., e K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, febbraio 2022. http://dx.doi.org/10.17487/rfc9172.
Testo completoBirrane, E., A. White e S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, febbraio 2022. http://dx.doi.org/10.17487/rfc9173.
Testo completoFarrell, S., M. Ramadas e S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, settembre 2008. http://dx.doi.org/10.17487/rfc5327.
Testo completoAtkinson, Randall J. Security for the Internet Protocol. Fort Belvoir, VA: Defense Technical Information Center, novembre 1995. http://dx.doi.org/10.21236/ada301902.
Testo completoAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, agosto 1995. http://dx.doi.org/10.17487/rfc1825.
Testo completoKent, S., e R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, novembre 1998. http://dx.doi.org/10.17487/rfc2401.
Testo completoHollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, maggio 2004. http://dx.doi.org/10.17487/rfc3749.
Testo completo