Sciweavers

5324 search results - page 168 / 1065
» Internet Security Protocols
Sort
View
COMPUTER
2000
102views more  COMPUTER 2000»
15 years 4 months ago
The Next-Generation Internet: Unsafe at Any Speed?
Abstract--An emerging generation of mission-critical networked applications is placing demands on the Internet protocol suite that go well beyond the properties they were designed ...
Kenneth P. Birman
ASM
2005
ASM
15 years 9 months ago
Verifying Security Protocols: An ASM Approach
In this paper we present a modeling technique for security protocols using Abstract State Machines [BS03,Gur95] (ASMs). We describe how we model the different agents in the scenar...
Dominik Haneberg, Holger Grandy, Wolfgang Reif, Ge...
132
Voted
CCS
2010
ACM
15 years 1 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
15 years 6 months ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
SEC
2001
15 years 5 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater