Sciweavers

3504 search results - page 157 / 701
» Secure protocol composition
Sort
View
104
Voted
JAR
2006
63views more  JAR 2006»
15 years 5 months ago
Automated Reasoning for Security Protocol Analysis
Alessandro Armando, David A. Basin, Jorge Cu&eacut...
142
Voted
JCS
2006
74views more  JCS 2006»
15 years 5 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater
JISE
2006
37views more  JISE 2006»
15 years 5 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
TISSEC
2008
80views more  TISSEC 2008»
15 years 5 months ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...
101
Voted
JCS
2007
69views more  JCS 2007»
15 years 5 months ago
Timed analysis of security protocols
Ricardo Corin, Sandro Etalle, Pieter H. Hartel, An...