Sciweavers

1853 search results - page 62 / 371
» Cryptographic Protocols and Network Security
Sort
View
RTA
2009
Springer
15 years 6 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
SPW
1999
Springer
15 years 4 months ago
Trust Management and Network Layer Security Protocols
Matt Blaze, John Ioannidis, Angelos D. Keromytis
SECPERU
2006
IEEE
15 years 5 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
WISEC
2010
ACM
15 years 6 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
IPL
2006
118views more  IPL 2006»
14 years 11 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune