Sciweavers

719 search results - page 38 / 144
» Proving Security Protocols Correct
Sort
View
67
Voted
ACSAC
1999
IEEE
15 years 2 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
79
Voted
IPL
2006
118views more  IPL 2006»
14 years 9 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
ADHOC
2007
122views more  ADHOC 2007»
14 years 9 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
ENTCS
2000
63views more  ENTCS 2000»
14 years 9 months ago
The Leader Election Protocol of IEEE 1394 in Maude
In this paper we consider two descriptions in Maude of the leader election protocol from the IEEE 1394 serial multimedia bus. Particularly, the time aspects of the protocol are st...
Alberto Verdejo, Isabel Pita, Narciso Martí...
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
15 years 10 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...