Sciweavers

3504 search results - page 148 / 701
» Secure protocol composition
Sort
View
CSFW
1995
IEEE
15 years 8 months ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf
171
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
158
Voted
ICOIN
2001
Springer
15 years 9 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
CAV
2009
Springer
106views Hardware» more  CAV 2009»
16 years 5 months ago
Models and Proofs of Protocol Security: A Progress Report
Bruno Blanchet, Hubert Comon-Lundh, Martín ...
CISIS
2009
IEEE
15 years 12 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...