Sciweavers

3504 search results - page 19 / 701
» Secure protocol composition
Sort
View
EUROCRYPT
2004
Springer
15 years 3 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
76
Voted
CSFW
2008
IEEE
15 years 4 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
IJNSEC
2007
130views more  IJNSEC 2007»
14 years 9 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding
80
Voted
PDCAT
2007
Springer
15 years 3 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
CAINE
2003
14 years 11 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé