Sciweavers

3751 search results - page 60 / 751
» Events in security protocols
Sort
View
CSFW
2008
IEEE
14 years 11 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
ESORICS
1994
Springer
15 years 1 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
GLOBECOM
2008
IEEE
15 years 4 months ago
TCP-PCP: A Transport Control Protocol Based on the Prediction of Congestion Probability over Wired/Wireless Hybrid Networks
—Many of packet loss as a result of factors other than congestion impact the performance of TCP in wired/wirelss hybrid networks. Firstly, this paper proposes one concept of Cong...
Jin Ye, Jianxin Wang, Liang Rong, Weijia Jia
APLAS
2007
ACM
15 years 1 months ago
Type-Based Verification of Correspondence Assertions for Communication Protocols
Gordon and Jeffrey developed a type system for checking correspondence assertions. The correspondence assertions, proposed by Woo and Lam, state that when a certain event (called a...
Daisuke Kikuchi, Naoki Kobayashi
CCS
2008
ACM
14 years 11 months ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...