Sciweavers

3751 search results - page 189 / 751
» Events in security protocols
Sort
View
137
Voted
OPODIS
2008
15 years 5 months ago
Impact of Information on the Complexity of Asynchronous Radio Broadcasting
We consider asynchronous deterministic broadcasting in radio networks. An execution of a broadcasting protocol is a series of events, each of which consists of simultaneous transm...
Tiziana Calamoneri, Emanuele G. Fusco, Andrzej Pel...
FOCS
2010
IEEE
15 years 2 months ago
On the Computational Complexity of Coin Flipping
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest executi...
Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
138
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
CSFW
1997
IEEE
15 years 8 months ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
EUROPKI
2008
Springer
15 years 5 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...