Sciweavers

5324 search results - page 159 / 1065
» Internet Security Protocols
Sort
View
IANDC
2007
151views more  IANDC 2007»
15 years 3 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
119
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 20 days ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
IFIP
2009
Springer
15 years 10 months ago
On Designing for Tussle: Future Internet in Retrospect
Abstract. Over the past decades, the fundamental principles of the Internet architecture have not significantly changed. However, Internet evolution and its effects on participants...
Costas Kalogiros, Alexandros Kostopoulos, Alan For...
117
Voted
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
15 years 9 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
CSFW
1998
IEEE
15 years 8 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider