Academic literature on the topic 'Security protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security protocol"

1

Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (2022): 9103. http://dx.doi.org/10.3390/s22239103.

Full text
Abstract:
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants. However, SIP is exposed to a variety of security threats. To overcome the security flaws of SIP, it needs to support a number of security services: authentication, confidentiality, and integrity. Few solutions have been introduced in the literature to secure SIP, which can support these security services. Most of them are based on internet security standards and have many drawbacks. This work i
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Garima, and Harish Mittal. "SS7 Signaling Protocol ? Security." International Journal of Scientific Engineering and Research 4, no. 5 (2016): 31–34. https://doi.org/10.70729/ijser15811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
APA, Harvard, Vancouver, ISO, and other styles
4

Günther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.

Full text
Abstract:
AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these co
APA, Harvard, Vancouver, ISO, and other styles
5

Nam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.

Full text
Abstract:
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3) the indistingu
APA, Harvard, Vancouver, ISO, and other styles
6

Amin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.

Full text
Abstract:
The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card) user authentication protocol with the RSA cryptosystem
APA, Harvard, Vancouver, ISO, and other styles
7

He, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ko, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (2021): 2057. http://dx.doi.org/10.3390/s21062057.

Full text
Abstract:
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although seve
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.

Full text
Abstract:
This paper proposed an applied-information technology in hierarchical network security protocols designing model based on public key, the designing of the protocols is to be completed in several layers. Each sub-protocol achieved a sub-goal that it should complete, and provided data interface to a higher sub-protocol. And then merged the sub-protocol of each layer, to complete the protocols designing. In the previous research, the security of the protocol in applied-information technology was always regarded as a whole, which caused the protocols designing to be tremendous complexity. The hier
APA, Harvard, Vancouver, ISO, and other styles
10

Du, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (2022): 24. http://dx.doi.org/10.3390/fi15010024.

Full text
Abstract:
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protoc
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security protocol"

1

O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.

Full text
Abstract:
Security protocols are important and widely used because they enable secure communication to take place over insecure networks. Over the years numerous formal methods have been developed to assist protocol designers by analysing models of these protocols to determine their security properties. Beyond the design stage however, developers rarely employ formal methods when implementing security protocols. This may result in implementation flaws often leading to security breaches. This dissertation contributes to the study of security protocol analysis by advancing the emerging field of implementa
APA, Harvard, Vancouver, ISO, and other styles
2

Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.

Full text
Abstract:
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer Security and Secure Shell protocols. We introduce new security frameworks for analysing security properties of protocols involving negotiation, multiple ciphersuites, long-term key reuse, and time synchronisation. Our results have increased confidence
APA, Harvard, Vancouver, ISO, and other styles
3

Choi, H. J. "Security protocol design by composition." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.

Full text
Abstract:
The aim of this research is to present a new methodology for the systematic de sign of compound protocols from their parts. Some security properties can be made accumulative, i.e. can be put together without interfering with one another, by carefully selecting the mechanisms which implement them. Among them are authentication, secrecy and non-repudiation. Based on this observation, a set of accumulative protocol mechanisms called <i>protocol primitives </i>are proposed and their correctness is verified. These protocol primitives are obtained from common mechanisms found in many security protoc
APA, Harvard, Vancouver, ISO, and other styles
4

Gibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Full text
Abstract:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unil
APA, Harvard, Vancouver, ISO, and other styles
5

Modesti, Paolo <1966&gt. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.

Full text
Abstract:
AnBx is an extension of the Alice & Bob notation for protocol narrations to serve as a specification language for a purely declarative modelling of distributed protocols. AnBx is built around a set of communication and data abstractions which provide primitive support for the high-level security guarantees, and help shield from the details of the underlying cryptographic infrastructure. Being implemented on top of the OFMC verification tool, AnBx serves not only for specification and design, but also for security analysis of distributed protocols. Moreover the framework, keeping apart the pr
APA, Harvard, Vancouver, ISO, and other styles
6

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.

Full text
Abstract:
There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security. The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certa
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security protocol"

1

Jones, Benjamin Edward. Improving security in the FDDI protocol. Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United Service Institution of India, ed. Integrated maritime security: Governing the ghost protocol. United Service Institution of India, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1969-, Rudnick Lisa B., and United Nations Institute for Disarmament Research, eds. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. United Nations Institute for Disarmament Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hehir, Stephen. A security target for the X.435 protocol. National Physical Laboratory, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaksonen, Rauli. A functional method for assessing protocol implementation security. Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Held, Gilbert. Managing TCP/IP networks: Techniques, tools, and security considerations. Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Armando, Alessandro, and Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada. Dept. of External Affairs. Social security: Agreement between Canada and Finland (with protocol). s.n, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security protocol"

1

Sahu, Satej Kumar. "Protocol Security." In Building Secure PHP Applications. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0932-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saïdi, Hassen, Victoria Stavridou, and Bruno Duterte. "Protocol Codesign." In Security Protocols. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stavridou, Victoria. "Protocol Codesign." In Security Protocols. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kelsey, John, Bruce Schneier, and David Wagner. "Protocol interactions and the chosen protocol attack." In Security Protocols. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schoenmakers, Berry. "Protocol." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hess, Andreas V., Sebastian A. Mödersheim, and Achim D. Brucker. "Stateful Protocol Composition." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paulson, Lawrence C. "The Yahalom Protocol." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Køien, Geir M. "Security Protocol Verification." In Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338147-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "protocol security option." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Access Protocol." In Security Access in Wireless Local Area Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security protocol"

1

Cai, Liujia, Tong Yu, Yumeng Li, et al. "SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Full text
Abstract:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct resul
APA, Harvard, Vancouver, ISO, and other styles
4

Pinto, Lucas W. P., and Jéferson C. Nobre. "Comparação entre as Extensões Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification para o Bundle Protocol." In IV Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wpietf.2017.3611.

Full text
Abstract:
Este documento tem como objetivo apresentar um estudo comparativo entre as extensões desenvolvidas para o Bundle Protocol conhecidas como Bundle Security Protocol, Streamlined Bundle Security Protocol e Bundle Protocol Security Specification. Apresenta ao decorrer do trabalho os motivos que levaram ao desenvolvimento de tais extensões, que não foram consideradas relevantes no principio do desenvolvimento do Bundle Protocol. Por fim, explana as diferentes características de cada extensão e as compara entre si.
APA, Harvard, Vancouver, ISO, and other styles
5

Tiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.

Full text
Abstract:
The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Zhiqiang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, and Qixu Liu. "Medical Protocol Security." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferreira, Thiago D., Otavio Felipe de Freitas, Renan C. A. Alves, Bruno C. Albertini, Marcos A. Simplicio Jr., and Daniel M. Batista. "SPDM-WiD: Uma Ferramenta para Inspeção de Pacotes do Security Protocol Data Model (SPDM)." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbrc_estendido.2024.3175.

Full text
Abstract:
Implementações de protocolos de rede precisam ser testadas em conjunto com boas ferramentas de depuração para garantir que a troca de pacotes segue as especificações. Embora sniffers de pacotes como o Wireshark consigam capturar qualquer pacote transitando por uma interface de rede, a ausência de dissecadores específicos para um protocolo torna a depuração tediosa e mais propensa a erros. Este artigo apresenta a ferramenta SPDM-WiD (SPDM Wireshark Dissector), um dissecador para inspeção de pacotes do Security Protocol Data Model (SPDM), um padrão aberto de comunicação para autenticação de hard
APA, Harvard, Vancouver, ISO, and other styles
8

Gervais, Mwitende. "Lightweight Certificateless Authenticated Key Agreement Protocol." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131928.

Full text
Abstract:
Data security and privacy are important to prevent the reveal, modification and unauthorized usage of sensitive information. The introduction of using critical power devices for internet of things (IoTs), e-commerce, e-payment, and wireless sensor networks (WSNs) has brought a new challenge of security due to the low computation capability of sensors. Therefore, the lightweight authenticated key agreement protocols are important to protect their security and privacy. Several researches have been published about authenticated key agreement. However, there is a need of lightweight schemes that c
APA, Harvard, Vancouver, ISO, and other styles
9

Bassil, Carole, Ahmed Serhrouchni, and Nicolas Rouhana. "Simple voice security protocol." In Proceeding of the 2006 international conference. ACM Press, 2006. http://dx.doi.org/10.1145/1143549.1143622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McDermott, J. "Visual security protocol modeling." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146293.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security protocol"

1

Symington, S., S. Farrell, H. Weiss, and P. Lovell. Bundle Security Protocol Specification. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McDermott, J. Visual Security Protocol Modeling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada464079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kuhn, D. R., K. Sriram, and D. C. Montgomery. Border gateway protocol security. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Birrane, E., and K. McKeever. Bundle Protocol Security (BPSec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Birrane, E., A. White, and S. Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farrell, S., M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Atkinson, Randall J. Security for the Internet Protocol. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada301902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Atkinson, R. Security Architecture for the Internet Protocol. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kent, S., and R. Atkinson. Security Architecture for the Internet Protocol. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!