Sciweavers

947 search results - page 14 / 190
» Provable Implementations of Security Protocols
Sort
View
155
Voted
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 11 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
EUROCRYPT
2004
Springer
15 years 10 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
128
Voted
ESOP
2003
Springer
15 years 10 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
138
Voted
TARK
2007
Springer
15 years 11 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
127
Voted
ISPEC
2009
Springer
16 years 4 days ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...