Sciweavers

460 search results - page 1 / 92
» Heuristic Methods for Security Protocols
Sort
View
CORR
2009
Springer
71views Education» more  CORR 2009»
13 years 3 months ago
Heuristic Methods for Security Protocols
Qurat ul Ain Nizamani, Emilio Tuosto
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 9 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
JDFP
2006
63views more  JDFP 2006»
13 years 5 months ago
Heuristic Security-Testing Methods
John E. Kerivan
CSFW
2003
IEEE
13 years 11 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla
IAT
2007
IEEE
13 years 12 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...