Essays about: "säkerhetsprotokoll"
Showing result 1 - 5 of 10 essays containing the word säkerhetsprotokoll.
-
1. Formal security analysis of authentication in an asynchronous communication model
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model is created of a protocol or system, and propositions about the security of the model are written. A program is then used to verify that the propositions hold, or find examples of where they do not. READ MORE
-
2. Secure and Privacypreserving V2X multicast DNS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. READ MORE
-
3. Evaluation of Certificate Enrollment over Application Layer Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. READ MORE
-
4. A reverse proxy for VoIP : Or how to improve security in a ToIP network
University essay from KTH/KommunikationsnätAbstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE
-
5. Verification of security protocols with state in ProVerif : Avoiding false attacks when verifying freshness
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : One of the issues when attempting to verify security properties of a protocol is how to model the protocol. We introduce a method for verifying event freshness in tools which use the applied π-calculus and are able to verify secrecy. Event freshness can be used to prove that a protocol never generates the same key twice. READ MORE