Sciweavers

1612 search results - page 7 / 323
» About models of security protocols
Sort
View
ICALP
2007
Springer
15 years 6 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
ACSAC
1999
IEEE
15 years 8 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
IWSEC
2007
Springer
15 years 10 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk
CSFW
2008
IEEE
15 years 11 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin