Sciweavers

286 search results - page 44 / 58
» Pitfalls in Formal Reasoning about Security Protocols
Sort
View
95
Voted
EUROCRYPT
2004
Springer
15 years 2 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
CALCO
2007
Springer
118views Mathematics» more  CALCO 2007»
15 years 3 months ago
Coalgebraic Epistemic Update Without Change of Model
Abstract. We present a coalgebraic semantics for reasoning about information update in multi-agent systems. The novelty is that we have one structure for both states and actions an...
Corina Cîrstea, Mehrnoosh Sadrzadeh
78
Voted
PEWASUN
2004
ACM
15 years 2 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
103
Voted
MSCS
2006
106views more  MSCS 2006»
14 years 9 months ago
LQP: the dynamic logic of quantum information
We present a dynamic logic for reasoning about information flow in quantum programs. In particular, we give a finitary syntax and a relational semantics for a Logic of Quantum Pro...
Alexandru Baltag, Sonja Smets