Replay tolerance of authentication protocols
Computer Communications / 18 / 12 / 988-992 / COCOD
Computer Communications / 18 / 12 / 988-992 / COCOD
Published in Journal of Combinatorial Optimization
Human-machine identification is an important problem in cryptography that has applications in network access, electronic commerce, and smart-card design. It is a hard problem largely because human users have a very limited capacity in memorizing secrets and in performing protocols. Therefore, in addition to the requirement that a human-machine iden...
Published in Multimedia Tools and Applications
The Personal Mobility Management System (PMMS), an agent-based message-oriented mobile computing application developed at Multimedia and Mobile Agent Research Laboratory, aims to provide personalized services and resources access to its nomadic users within a virtual network across different organizations. This paper analyses and discusses the secu...
This thesis covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers and stable communication links and in the form of an...
Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is ver...
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destination. One way to improve the security and performance of Internet is to routinely examine the routing data. In this case study, we show how interactive visualization of Borde...
Published in Journal of Computer Science and Technology
In today's Internet computing world, illegal activities by crackers pose a serious threat to computer security. It is well known that computer viruses, Trojan horses and other intrusive programs may cause severe and often catastrophic consequences. This paper proposes a novel secure computer architecture based on security-code. Every instruction/da...
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2003 / Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2003 / Bu çalışmada, akıllıkart teknolojisi kullanılarak, yerel ağlar üzerinde güvenli mesajlaşmaya imkan veren bir sistem tasarlanmıştır. Akıllıkartlar, çeşitli güvenlik uygulama...