Sciweavers

3751 search results - page 11 / 751
» Events in security protocols
Sort
View
111
Voted
CSFW
1996
IEEE
15 years 7 months ago
A High-Throughput Secure Reliable Multicast Protocol
Dalia Malki, Michael K. Reiter
134
Voted
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 10 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
96
Voted
ACISP
2009
Springer
15 years 10 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
102
Voted
CSFW
2008
IEEE
15 years 10 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin
94
Voted
CSFW
2007
IEEE
15 years 10 months ago
Electing the Doge of Venice: Analysis of a 13th Century Protocol
Miranda Mowbray, Dieter Gollmann