Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Daniel Migault"'
Autor:
Amine Boukhtouta, Li Yang, Abdallah Moubayed, Stere Preda, Parisa Heidari, Richard Brunner, Abdallah Shami, Daniel Migault, Adel Larabi
Publikováno v:
IEEE Transactions on Network and Service Management. 19:686-705
Content delivery networks (CDNs) provide efficient content distribution over the Internet. CDNs improve the connectivity and efficiency of global communications, but their caching mechanisms may be breached by cyber-attackers. Among the security mech
Autor:
Mohammad A. Salahuddin, Elaheh Jalalpour, Stere Preda, Raouf Boutaba, Daniel Migault, Milad Ghaznavi
Publikováno v:
IEEE Communications Surveys & Tutorials. 23:2166-2190
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to end users with high performance. CDNs are critical to provide and protect the availability of Internet contents. However, adversaries can not only evade t
Autor:
Robert Moskowitz, Liang Xia, Nik Teague, Kaname Nishizuka, Stefan Fouant, Daniel Migault, Roland Dobbins
The DDoS Open Threat Signaling (DOTS) effort is intended to provide protocols to facilitate interoperability across disparate DDoS mitigation solutions. This document presents use cases which describe the interactions expected between the DOTS compon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35d61522e92a18c59930cfe67de0a78b
https://doi.org/10.17487/rfc8903
https://doi.org/10.17487/rfc8903
Autor:
Frederic Fieau, Stere Preda, Ioana Boureanu, Daniel Migault, Hyame Assem Alamedine, Mohammad Mannan, Sanjay Mishra
Publikováno v:
TrustCom
By design, TLS (Transport Layer Security) is a 2-party, end-to-end protocol. Yet, in practice, TLS delegation is often deployed: that is, middlebox proxies inspect and even modify TLS traffic between the endpoints. Recently, industry-leaders (e.g., A
Encapsulating Security Payload (ESP) sends an initialization vector (IV) in each packet. The size of IV depends on the applied transform, being usually 8 or 16 octets for the transforms defined by the time this document is written. Some algorithms su
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe0ee3bde871dd8611092bbf93509f3c
https://doi.org/10.17487/rfc8750
https://doi.org/10.17487/rfc8750
Autor:
Bruno M. Barros, Tereza Cristina Melo de Brito Carvalho, Marcos A. Simplicio, Daniel Migault, Thiago R. M. Almeida, Ewerton R. Andrade, Makan Pourzandi
Publikováno v:
Computers & Electrical Engineering. 69:224-239
Network function virtualization opens a new era for security, allowing on-demand instantiation of defense appliances via technologies such as SDN (Software Defined Networking) and Service Function Chaining (SFC). Taking full advantage of such capabil
Autor:
Maryline Laurent, Tobias Guggemos, Sylvain Killian, Daniel Migault, Guy Pujolle, Jean Philippe Wary
Publikováno v:
Journal of Computer Security
Journal of Computer Security, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, IOS Press, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, IOS Press, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
International audience; The number of devices connected through the Internet of Things (IoT) will significantly grow in the next few years while security of their interconnections is going to be a major challenge. For many devices in IoT scenarios, t
Autor:
Yaron Sheffer, Daniel Migault
Misissued public-key certificates can prevent TLS clients from appropriately authenticating the TLS server. Several alternatives have been proposed to detect this situation and prevent a client from establishing a TLS session with a TLS end point aut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b68d2be527ce0dfccb4fe18248f09f2
https://doi.org/10.17487/rfc8672
https://doi.org/10.17487/rfc8672
Autor:
Daniel Migault, John Mattsson
This document defines several new cipher suites for the Transport Layer Security (TLS) protocol version 1.2. The cipher suites are all based on the Ephemeral Elliptic Curve Diffie-Hellman with Pre-Shared Key (ECDHE_PSK) key exchange together with the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0de1e2befa88866583b7ce2ca63ddb75
https://doi.org/10.17487/rfc8442
https://doi.org/10.17487/rfc8442
Autor:
Raouf Boutaba, Milad Ghaznavi, Daniel Migault, Elaheh Jalalpour, Stere Preda, Makan Pourzandi
Publikováno v:
NetSoft
A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation and disruption in serving en