Sciweavers

3504 search results - page 156 / 701
» Secure protocol composition
Sort
View
121
Voted
DEDS
2008
88views more  DEDS 2008»
15 years 5 months ago
Analyzing Security Protocols Using Time-Bounded Task-PIOAs
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Mos...
COMCOM
2006
88views more  COMCOM 2006»
15 years 5 months ago
A lightweight secure protocol for wireless sensor networks
Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao
94
Voted
ENTCS
2006
89views more  ENTCS 2006»
15 years 5 months ago
Towards a Quantitative Analysis of Security Protocols
Pedro Adão, Paulo Mateus, Tiago Reis, Luca ...
102
Voted
IJISEC
2008
46views more  IJISEC 2008»
15 years 5 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
CORR
2007
Springer
56views Education» more  CORR 2007»
15 years 5 months ago
Deciding security properties for cryptographic protocols. Application to key cycles
Hubert Comon-Lundh, Véronique Cortier, Euge...