Sciweavers

1777 search results - page 54 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
2010
Springer
14 years 8 months ago
AnBx - Security Protocols Design and Verification
Michele Bugliesi, Paolo Modesti
IFIP
2010
Springer
14 years 8 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
ACSAC
2000
IEEE
15 years 5 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
CSFW
1998
IEEE
15 years 5 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe