Sciweavers

1612 search results - page 7 / 323
» About models of security protocols
Sort
View
ICALP
2007
Springer
15 years 29 days ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
ACSAC
1999
IEEE
15 years 3 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
IWSEC
2007
Springer
15 years 5 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk
69
Voted
CSFW
2008
IEEE
15 years 5 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin