Sciweavers

28 search results - page 4 / 6
» A Certified E-Mail Protocol
Sort
View
EPEW
2005
Springer
13 years 11 months ago
Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step
Abstract. Global choreographies define the rules that peers should respect in their interaction, with the aim of guaranteeing interoperability. act choreography can be seen as a p...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
14 years 6 days ago
Reachability calculations for automated aerial refueling
— This paper describes reachability calculations for a hybrid system formalism governing UAVs interacting with another vehicle in a safety-critical situation. We examine this pro...
Jerry Ding, Jonathan Sprinkle, Shankar S. Sastry, ...
ASIACRYPT
2008
Springer
13 years 7 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
CCS
2008
ACM
13 years 7 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
EUROCRYPT
2007
Springer
13 years 12 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek