Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing all 9 articles
Browse latest View live

Analysis of Scalable Security – MC-SSL Savings

This paper investigates how MC-SSL can alleviate the CPU requirements of secure web transactions by using multiple channels, each with its own, different, cipher suite, and switching the channel based...

View Article



Supporting End-to-end security Across Proxies with Multiple-channel SSL

Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate with servers. This...

View Article

Implementing Multiple Channels over SSL

Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. In contrast to SSL, MC-SSL can securely provide applications with multiple channels, and each of...

View Article

Multiple-Channel Security Model And Its Implementation Over SSL

Multiple-Channel SSL (MC-SSL) is a new model and protocol to secure client-server communication. In contrast to SSL, which provides a single end-to-end secure channel, MCSSL can provide applications...

View Article

Multiple-Channel Security Architecture and Its Implementation over SSL

This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel,...

View Article


A Security Analysis of the Precise Time Protocol (Short Paper)

This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b)...

View Article

A Security Analysis of the Precise Time Protocol

This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b)...

View Article

A Security Analysis of the Precise Time Protocol

We present a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b) illegally...

View Article


The Socialbot Network: When Bots Socialize for Fame and Money

Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images