Sciweavers

659 search results - page 54 / 132
» Compiling and securing cryptographic protocols
Sort
View
ESORICS
2005
Springer
15 years 6 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
117
Voted
TCS
2008
15 years 12 days ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
114
Voted
INDOCRYPT
2009
Springer
15 years 7 months ago
Reusing Static Keys in Key Agreement Protocols
Abstract. Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment proto...
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaogl...
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
15 years 2 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
96
Voted
PERCOM
2007
ACM
16 years 2 days ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins