Sciweavers

3751 search results - page 63 / 751
» Events in security protocols
Sort
View
CONEXT
2006
ACM
15 years 3 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
POPL
2010
ACM
15 years 7 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...
ESORICS
2003
Springer
15 years 3 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
ICTCS
2005
Springer
15 years 3 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek