Sciweavers

1777 search results - page 125 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
2010
Springer
14 years 8 months ago
A Calculus for the Analysis of Wireless Network Security Protocols
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled ...
Francesco Ballardin, Massimo Merro
ISESE
2005
IEEE
15 years 6 months ago
Dialog-based protocol: an empirical research method for cognitive activities in software engineering
This paper proposes dialog-based protocol for the study of the cognitive activities during software development and evolution. The dialog-based protocol, derived from the idea of ...
Shaochun Xu, Václav Rajlich
EUROGP
2008
Springer
15 years 3 months ago
Evolving Proactive Aggregation Protocols
We present an approach for the automated synthesis of proactive aggregation protocols using Genetic Programming and discuss major decisions in modeling and simulating distributed a...
Thomas Weise, Michael Zapf, Kurt Geihs
FSTTCS
2003
Springer
15 years 6 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 5 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...