Search Results - "Staamann, S."
-
1
Extensions to an authentication technique proposed for the global mobility network
Published in IEEE transactions on communications (01-03-2000)“…We present three attacks on the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE…”
Get full text
Journal Article -
2
A pessimistic approach to trust in mobile agent platforms
Published in IEEE internet computing (01-09-2000)“…The problem of protecting an execution environment from possibly malicious mobile agents has been studied extensively, but the reverse problem, protecting the…”
Get full text
Journal Article -
3
A simple logic for authentication protocol design
Published in Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238) (1998)“…The authors describe a simple logic. The logic uses the notion of channels that are generalisations of communication links with various security properties…”
Get full text
Conference Proceeding -
4
Security in the Telecommunications Information Networking Architecture-the CrySTINA approach
Published in Proceedings TINA '97 - Global Convergence of Telecommunications and Distributed Object Computing (1997)“…We present the first results of the CrySTINA project. We analyze and structure the security problem domain in the TINA-C architecture and present our approach…”
Get full text
Conference Proceeding -
5
Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example
Published in 2008 IEEE International Conference on Emerging Technologies and Factory Automation (01-09-2008)“…Field-programmable gate arrays provide a flexible and easy-to-configure implementation platform that supports the development of tamper-proof networked…”
Get full text
Conference Proceeding -
6
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
Published in 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07) (01-05-2007)“…In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system…”
Get full text
Conference Proceeding -
7
Workshop on Electronic Commerce (Welcom) Foreward
Published in Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (1999)“…Presents the introductory welcome message from the conference proceedings…”
Get full text
Conference Proceeding