Sciweavers

947 search results - page 22 / 190
» Provable Implementations of Security Protocols
Sort
View
ENTCS
2007
129views more  ENTCS 2007»
14 years 11 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
89
Voted
ESORICS
2009
Springer
16 years 10 days ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
ESORICS
2007
Springer
15 years 5 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
ICDCS
1998
IEEE
15 years 4 months ago
CLIQUES: A New Approach to Group Key Agreement
This paper considers the problem of key agreement in a group setting with highly-dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the w...
Michael Steiner, Gene Tsudik, Michael Waidner
FSTTCS
2003
Springer
15 years 5 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann