Sciweavers

1612 search results - page 183 / 323
» About models of security protocols
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 5 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
71
Voted
ISSTA
2006
ACM
15 years 4 months ago
Towards self-adaptive service-oriented architectures
Web services, service-oriented, and service-discovery architectures help developers solve complex business cases, reduce costs, risks, and time-to-market. The task of developers i...
Giovanni Denaro, Mauro Pezzè, Davide Tosi, ...
90
Voted
ATAL
2001
Springer
15 years 2 months ago
Commitment Machines
We develop an approach in which we model communication protocols via commitment machines. Commitment machines supply a content to protocol states and actions in terms of the social...
Pinar Yolum, Munindar P. Singh
92
Voted
JUCS
2008
166views more  JUCS 2008»
14 years 10 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
MSWIM
2005
ACM
15 years 3 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu