Sciweavers

460 search results - page 15 / 92
» Heuristic Methods for Security Protocols
Sort
View
149
Voted
ACSAC
2001
IEEE
15 years 7 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç
143
Voted
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 5 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
152
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
125
Voted
LICS
2006
IEEE
15 years 9 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
138
Voted
CCS
2005
ACM
15 years 9 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov