Sciweavers

3751 search results - page 201 / 751
» Events in security protocols
Sort
View
POLICY
2007
Springer
15 years 10 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
166
Voted
CSFW
1995
IEEE
15 years 7 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
LREC
2010
132views Education» more  LREC 2010»
15 years 5 months ago
Resources for Controlled Languages for Alert Messages and Protocols in the European Perspective
This paper is concerned with resources for controlled languages for alert messages and protocols in the European perspective. These resources have been produced as the outcome of ...
Sylviane Cardey, Krzysztof Bogacki, Xavier Blanco,...
IPL
2006
87views more  IPL 2006»
15 years 4 months ago
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
The Diffie-Hellman key agreement protocol is based on taking large powers of a generator of a prime-order cyclic group. Some generators allow faster exponentiation. We show that to...
Boaz Tsaban
IEEEARES
2006
IEEE
15 years 10 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon