Добірка наукової літератури з теми "Security protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security protocol"
Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (November 23, 2022): 9103. http://dx.doi.org/10.3390/s22239103.
Повний текст джерелаRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Повний текст джерелаGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Повний текст джерелаHe, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.
Повний текст джерелаNam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.
Повний текст джерелаAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Повний текст джерелаKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (March 15, 2021): 2057. http://dx.doi.org/10.3390/s21062057.
Повний текст джерелаWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Повний текст джерелаDu, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (December 31, 2022): 24. http://dx.doi.org/10.3390/fi15010024.
Повний текст джерелаBala, Suman, Gaurav Sharma, Hmani Bansal, and Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.
Повний текст джерелаДисертації з теми "Security protocol"
O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Повний текст джерелаDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Повний текст джерелаChoi, H. J. "Security protocol design by composition." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Повний текст джерелаGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Повний текст джерелаModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Повний текст джерелаAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Повний текст джерелаThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Повний текст джерелаDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Повний текст джерелаHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Повний текст джерелаHanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.
Знайти повний текст джерелаКниги з теми "Security protocol"
Dorgham, Sisalem, ed. SIP security. Chichester, West Sussex, U.K: Wiley, 2009.
Знайти повний текст джерелаJones, Benjamin Edward. Improving security in the FDDI protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Знайти повний текст джерелаEric, Vyncke, ed. IPv6 security. Indianapolis, IN: Cisco Systems, 2009.
Знайти повний текст джерелаUnited Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. New Delhi: United Service Institution of India, 2014.
Знайти повний текст джерелаMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Знайти повний текст джерелаMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Знайти повний текст джерела1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Знайти повний текст джерелаHehir, Stephen. A security target for the X.435 protocol. Teddington: National Physical Laboratory, 1995.
Знайти повний текст джерелаKaksonen, Rauli. A functional method for assessing protocol implementation security. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Знайти повний текст джерелаArmando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Повний текст джерелаЧастини книг з теми "Security protocol"
Saïdi, Hassen, Victoria Stavridou, and Bruno Duterte. "Protocol Codesign." In Security Protocols, 106–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.
Повний текст джерелаStavridou, Victoria. "Protocol Codesign." In Security Protocols, 114–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.
Повний текст джерелаKelsey, John, Bruce Schneier, and David Wagner. "Protocol interactions and the chosen protocol attack." In Security Protocols, 91–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.
Повний текст джерелаSchoenmakers, Berry. "Protocol." In Encyclopedia of Cryptography and Security, 990. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.
Повний текст джерелаHess, Andreas V., Sebastian A. Mödersheim, and Achim D. Brucker. "Stateful Protocol Composition." In Computer Security, 427–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.
Повний текст джерелаPaulson, Lawrence C. "The Yahalom Protocol." In Security Protocols, 78–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.
Повний текст джерелаKøien, Geir M. "Security Protocol Verification." In Entity Authentication and Personal Privacy in Future Cellular Systems, 209–19. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.
Повний текст джерелаWeik, Martin H. "protocol security option." In Computer Science and Communications Dictionary, 1362. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.
Повний текст джерелаMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Access Protocol." In Security Access in Wireless Local Area Networks, 87–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.
Повний текст джерелаMyrvang, Per Harald, and Tage Stabell-Kulø. "Cordial Security Protocol Programming." In Security Protocols, 62–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_11.
Повний текст джерелаТези доповідей конференцій з теми "Security protocol"
Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Повний текст джерелаPinto, Lucas W. P., and Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol." In IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.
Повний текст джерелаWang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, and Qixu Liu. "Medical Protocol Security." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.
Повний текст джерелаBassil, Carole, Ahmed Serhrouchni, and Nicolas Rouhana. "Simple voice security protocol." In Proceeding of the 2006 international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.
Повний текст джерелаMcDermott, J. "Visual security protocol modeling." In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.
Повний текст джерелаCha, Eun-Chul, Hyoung-Kee Choi, and Sung-Jae Cho. "Evaluation of Security Protocols for the Session Initiation Protocol." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317885.
Повний текст джерелаMartin, Cynthia E., and Jeffrey H. Dunn. "Internet Protocol Version 6 (IPv6) Protocol Security Assessment." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455200.
Повний текст джерелаQing-gui, Hu. "The new IPv6 security protocol-limited transmission protocol." In 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.
Повний текст джерелаZisiadis, Dimitris, Spyros Kopsidas, and Leandros Tassiulas. "Voice Interactive Personalized Security Protocol: Definition and Security Analysis." In 2007 3rd IEEE Workshop on Secure Network Protocols. IEEE, 2007. http://dx.doi.org/10.1109/npsec.2007.4371621.
Повний текст джерелаDunbar, DeJean. "Survey of Secure Network Protocols: United States Related Domains." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121207.
Повний текст джерелаЗвіти організацій з теми "Security protocol"
Symington, S., S. Farrell, H. Weiss, and P. Lovell. Bundle Security Protocol Specification. RFC Editor, May 2011. http://dx.doi.org/10.17487/rfc6257.
Повний текст джерелаMcDermott, J. Visual Security Protocol Modeling. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada464079.
Повний текст джерелаKuhn, D. R., K. Sriram, and D. C. Montgomery. Border gateway protocol security. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.
Повний текст джерелаBirrane, E., and K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9172.
Повний текст джерелаBirrane, E., A. White, and S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9173.
Повний текст джерелаFarrell, S., M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, September 2008. http://dx.doi.org/10.17487/rfc5327.
Повний текст джерелаAtkinson, Randall J. Security for the Internet Protocol. Fort Belvoir, VA: Defense Technical Information Center, November 1995. http://dx.doi.org/10.21236/ada301902.
Повний текст джерелаAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1825.
Повний текст джерелаKent, S., and R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, November 1998. http://dx.doi.org/10.17487/rfc2401.
Повний текст джерелаHollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3749.
Повний текст джерела