Sciweavers

631 search results - page 3 / 127
» Intrusion-Resilient Secure Channels
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
CCS
2010
ACM
13 years 4 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
JNCA
2011
185views more  JNCA 2011»
13 years 1 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 1 months ago
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel wh...
Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendo...
ESORICS
2009
Springer
14 years 6 months ago
Secure Pseudonymous Channels
Luca Viganò, Sebastian Mödersheim