Sciweavers

3504 search results - page 151 / 701
» Secure protocol composition
Sort
View
125
Voted
NOMS
2006
IEEE
134views Communications» more  NOMS 2006»
15 years 11 months ago
Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols
Darlan Vivian, Eduardo Adílio Pelinson Alch...
111
Voted
AINA
2005
IEEE
15 years 10 months ago
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR
Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
167
Voted
CAV
2005
Springer
196views Hardware» more  CAV 2005»
15 years 10 months ago
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Alessandro Armando, David A. Basin, Yohan Boichut,...
99
Voted
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
15 years 10 months ago
On Session Key Construction in Provably-Secure Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
TARK
2005
Springer
15 years 10 months ago
Deciding knowledge properties of security protocols
Ramaswamy Ramanujam, S. P. Suresh