Sciweavers

719 search results - page 22 / 144
» Proving Security Protocols Correct
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 9 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
PODS
1999
ACM
127views Database» more  PODS 1999»
15 years 1 months ago
Atomicity with Incompatible Presumptions
We identify one of the incompatibility problems associated with atomic commit :protocols that prevents them from being used together and weiderive a correctness criterion that cap...
Yousef J. Al-Houmaily, Panos K. Chrysanthis
EUROCRYPT
2007
Springer
15 years 1 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
74
Voted
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 3 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani