Sciweavers

719 search results - page 21 / 144
» Proving Security Protocols Correct
Sort
View
77
Voted
IEEEARES
2010
IEEE
15 years 4 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
WOTUG
2008
14 years 11 months ago
Mechanical Verification of a Two-Way Sliding Window Protocol
Abstract. We prove the correctness of a two-way sliding window protocol with piggybacking, where the acknowledgments of the latest received data are attached to the next data trans...
Bahareh Badban, Wan Fokkink, Jaco van de Pol
77
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
COMCOM
2000
143views more  COMCOM 2000»
14 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou