Sciweavers

Share
ESORICS
2005
Springer
10 years 5 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
ESORICS
2005
Springer
10 years 5 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
ESORICS
2005
Springer
10 years 5 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
ESORICS
2005
Springer
10 years 5 months ago
Soundness of Formal Encryption in the Presence of Key-Cycles
Pedro Adão, Gergei Bana, Jonathan Herzog, A...
books