Sciweavers

403 search results - page 40 / 81
» An algebra for commitment protocols
Sort
View
FOSAD
2009
Springer
15 years 6 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
ICNP
2007
IEEE
15 years 6 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
IANDC
2008
105views more  IANDC 2008»
14 years 12 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 6 months ago
Exploiting Our Computational Surroundings for Better Mobile Collaboration
Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available ...
João Pedro Barreto, Paulo Ferreira, Marc Sh...
FOCS
2005
IEEE
15 years 5 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...