Sciweavers

947 search results - page 14 / 190
» Provable Implementations of Security Protocols
Sort
View
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 6 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
EUROCRYPT
2004
Springer
15 years 5 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
ESOP
2003
Springer
15 years 4 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
TARK
2007
Springer
15 years 5 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
ISPEC
2009
Springer
15 years 6 months ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...