Sciweavers

1825 search results - page 16 / 365
» Cryptographic Securities Exchanges
Sort
View
ACISP
2010
Springer
15 years 2 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
CSFW
2007
IEEE
15 years 7 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
CSFW
1999
IEEE
15 years 5 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
SPW
2004
Springer
15 years 6 months ago
A Cryptographic Framework for the Controlled Release of Certified Data
Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
ASM
2008
ASM
15 years 3 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa